header-logo
Suggest Exploit
vendor:
N/A
by:
Ashiyane Digital Security Team
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010

runt-communications Design SQL Injection Vulnerability

runt-communications Design SQL Injection Vulnerability is a vulnerability that allows an attacker to inject malicious SQL code into a vulnerable web application. This can be exploited to gain access to sensitive data stored in the database, such as user credentials, or to execute arbitrary code on the server. The vulnerability is caused by insufficient input validation in the application, allowing an attacker to inject malicious SQL code into the application. The vulnerability can be exploited by sending a specially crafted HTTP request containing malicious SQL code to the vulnerable application. The malicious code will then be executed on the server, allowing the attacker to gain access to sensitive data or execute arbitrary code.

Mitigation:

Input validation should be used to ensure that user-supplied data is properly sanitized before being used in SQL queries. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

=========================================================
runt-communications Design SQL Injection Vulnerability
=========================================================
##########################################
# Name: runt-communications Design SQL Injection Vulnerability
# Date: 2010-05-23
# vendor: http://runtcommunications.com
# Author: Ashiyane Digital Security Team
# Discovered By: XroGuE
# Contact: Xrogue_p3rsi4n_hack3r[at]Hotmail[Dot]com
# Home: www.Ashiyane.org
##########################################

[+] Dork: intext:Design by: runt communications

[+] Vulnerability: http://[site]/[path]/page.php?id=[SQLi]

[+] Demo: http://server/spotlight.php?id=-999+union+all+select+version(),2,3,4,5--


##########################################