vendor:
Pligg
by:
Ams
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Pligg
Affected Version From: 9.9.5 Beta
Affected Version To: 9.9.5 Beta
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020
Pligg 9.9.5 Beta Perl exploit
Pligg 9.9.5 Beta contains a vulnerability in 'evb/check_url.php' unfiltered $_GET['url'] parameter. The filtration strips tags and converts html special chars, but it is not enough, because an attacker can use MySQLs CHAR() function to convert shell to allowed chars. The exploit tries to get the full server path, but if not succeeded, then it will brute it. If the path has been found then the exploit will try to upload a tiny shell via SQL-Injection.
Mitigation:
Ensure that user input is properly sanitized and filtered before being used in SQL queries.