header-logo
Suggest Exploit
vendor:
Mambo Open Source Server
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Mambo Open Source Server
Affected Version From: 4.0.14
Affected Version To: 4.0.14
Patch Exists: YES
Related CWE: N/A
CPE: a:mambo:mambo_open_source_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Multiple Input Validation Vulnerabilities in Mambo Open Source Server

It has been reported that Mambo Open Source Server is prone to multiple input validation vulnerabilities that may allow remote attackers to inject malicious SQL syntax into database queries and send anonymous e-mail to arbitrary users. The vulnerabilities have been reported to exists in the banners.php, emailfriend/emailarticle.php, and contact.php modules of ths software. An example of malicious SQL syntax injection is http://www.example.com/mambo/emailfriend/emailarticle.php?submit=submit&email=example@example.com&youremail=example@example.com&id=100 UNION select username,email,password from mos_users where id=1

Mitigation:

Input validation should be performed to ensure that user-supplied data does not contain malicious SQL syntax.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/8647/info
 
It has been reported that Mambo Open Source Server is prone to multiple input validation vulnerabilities that may allow remote attackers to inject malicious SQL syntax into database queries and send anonymous e-mail to arbitrary users.
 
The vulnerabilities have been reported to exists in the banners.php, emailfriend/emailarticle.php, and contact.php modules of ths software.
 
Mambo Open Source Server 4.0.14 has been reported to be prone to this problem, however other versions may be affected as well.

http://www.example.com/mambo/emailfriend/emailarticle.php?submit=submit&email=example@example.com&youremail=example@example.com&id=100 UNION select username,email,password from mos_users where id=1