header-logo
Suggest Exploit
vendor:
phpCommunityCalendar
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpCommunityCalendar
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

phpCommunityCalendar Multiple SQL Injection Vulnerabilities

phpCommunityCalendar is prone to multiple SQL injection vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied input before being used in SQL queries. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. An attacker can exploit this issue by accessing http://www.example.com/[path]/webadmin/login.php and use this: login: ' or isnull(1/0) /* password: [nothing here]

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized before being used in SQL queries.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/14763/info

phpCommunityCalendar is prone to multiple SQL injection vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied input before being used in SQL queries.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. 

http://www.example.com/[path]/webadmin/login.php and use this:

login: ' or isnull(1/0) /*
password: [nothing here]