vendor:
Simple Forum
by:
S@BUN
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Simple Forum
Affected Version From: 1.1
Affected Version To: 1.11
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Simple Forum Version 1.10-1.11 SQL Injection
Simple Forum versions 1.10 and 1.11 are vulnerable to SQL injection. An attacker can exploit this vulnerability by sending malicious SQL queries to the database. This can be done by appending malicious SQL queries to the vulnerable parameter in the URL. For example, an attacker can append &topic=-99999/**/UNION/**/SELECT/**/concat(0x7c,user_login,0x7c,user_pass,0x7c)/**/FROM/**/wp_users/* to the vulnerable parameter in the URL.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in SQL queries.