vendor:
phpDirectorySource
by:
InjEctOr and FishEr762
8.8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpDirectorySource
Affected Version From: 1.1
Affected Version To: 1.1
Patch Exists: NO
Related CWE: N/A
CPE: a:phpdirectorysource:phpdirectorysource:1.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
SQL Injection and Bypass Administrator Login
SQL Injection vulnerability exists in phpDirectorySource 1.1 which allows an attacker to bypass administrator login and extract sensitive information from the database. The vulnerability is due to improper sanitization of user-supplied input in the 'lid' parameter of the 'show.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script with malicious SQL statements in the 'lid' parameter. This will allow the attacker to bypass administrator login and extract sensitive information from the database.
Mitigation:
Input validation should be used to ensure that untrusted data is not allowed into the system. Sanitize user-supplied input to prevent SQL injection attacks.