vendor:
PHP Director
by:
Juri Gianni aka yeat
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP Director
Affected Version From: 2000.2.1
Affected Version To: 2000.2.1
Patch Exists: NO
Related CWE: N/A
CPE: a:php_director:php_director:0.2.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2009
PHP Director 0.2.1 (sql into outfile) eval() Injection Exploit
This exploit is for PHP Director 0.2.1 which is vulnerable to SQL injection. The vulnerability is due to the fact that the $cat variable is not checked, allowing an attacker to inject malicious SQL code. The exploit is written in C and can be compiled with gcc. The exploit will create a file in the web root directory with the name specified in the command line arguments.
Mitigation:
The vulnerability can be mitigated by using mysql_real_escape_string() to sanitize the user input.