vendor:
SimpleNews
by:
Silentz
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: SimpleNews
Affected Version From: <= 1.0.0 FINAL
Affected Version To: <= 1.0.0 FINAL
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
Unknown
SimpleNews <= 1.0.0 FINAL SQL Injection Exploit
This exploit allows an attacker to retrieve the admin username and hash from the SimpleNews <= 1.0.0 FINAL system. The vulnerability is caused by a lack of input validation in the 'news_id' parameter of the 'print.php' script. By injecting a specially crafted SQL query, an attacker can retrieve sensitive information from the database.
Mitigation:
To mitigate this vulnerability, it is recommended to implement proper input validation and parameterized queries to prevent SQL injection attacks. Additionally, enabling the 'magic_quotes_gpc' setting can also help protect against this type of vulnerability.