vendor:
Logz podcast CMS
by:
ZoRLu
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Logz podcast CMS
Affected Version From: 1.3.2001
Affected Version To: 1.3.2001
Patch Exists: YES
Related CWE: N/A
CPE: a:logz_podcast_cms:logz_podcast_cms:1.3.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Logz podcast CMS version 1.3.1 Remote sql inj
An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable server. The request should contain a malicious SQL query in the ‘art’ parameter. This malicious query will be executed in the backend database, allowing the attacker to gain access to sensitive information such as usernames and passwords.
Mitigation:
The best way to mitigate this vulnerability is to sanitize user input and validate it before passing it to the backend database.