header-logo
Suggest Exploit
vendor:
Populum
by:
-[SiLeNtp0is0n]-
8,8
CVSS
HIGH
SQL injection
89
CWE
Product Name: Populum
Affected Version From: 2.3
Affected Version To: 2.3
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
N/A

Populum SQL injection vulnerability

Populum version 2.3 is vulnerable to SQL injection. The vulnerable parameters are 'did' and 'id' in the URLs '127.0.0.1/populum/diarypage.php?did=[SQL injection]' and '127.0.0.1/populum/link.php?id=[SQL injection]'. An attacker can exploit this vulnerability to gain unauthorized access to the application.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

# Exploit Title: Populum SQL injection vulnerability
# Author: -[SiLeNtp0is0n]-
# Version: 2.3

::::::::::::::ProUd to Be InDiaN::::::::::::::

~AuthoR : -[SiLeNtp0is0n]-
~Vuln. App : Populum version 2.3
~App Detail : Content management software for hybrid blog/media/commerce communities
~VuLneraBiLity : SQL injection
~DoRk : "Powered by Populum"
~My HoMe : www.andhrahackers.com
~gReetZ : Mr.XXXX ShRushe tRif0Rce h3LLb0y bRonRiC
~SpL gReetZ : TeamICW

:::::::::::::::::::::::::::::::::::::::::::::::

Vulnerable :

127.0.0.1/populum/diarypage.php?did=[SQL injection]
127.0.0.1/populum/link.php?id=[SQL injection]