header-logo
Suggest Exploit
vendor:
PHP City Portal Script Software
by:
Don (BalcanCrew & BalcanHack)
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP City Portal Script Software
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Apache (Unix)
2011

Php City Portal Script Software SQL Injection

An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of the database and/or expose sensitive information.

Mitigation:

Filter metacharacters from user input.
Source

Exploit-DB raw data:

############################################################################
# Exploit Title: *Php City Portal Script Software SQL Injection*
# Google Dork: *Powered by PHPCityPortal.com*
# Date: *Decembar/07/2011*
# Author: *Don (BalcanCrew & BalcanHack)*
# Software Link: *http://phpcityportal.com*
# Version: *1.1*
# Tested on: *Apache (Unix)*
############################################################################
# An attacker may execute arbitrary SQL statements on the vulnerable system.
# This may compromise the integrity of your database and/or expose
sensitive information.
############################################################################
*Attack details:*

URL encoded GET input userName was set to *1'*
Error message found: supplied argument is not a valid MySQL result

Vulnerability:
*http://localhost/phpcityportal/profile.php?userName= (SQL)*

*How to fix this vulnerability:*
Filter metacharacters from user input.

*NOTE!*
*You have to be logged in!*

~Don 2011