header-logo
Suggest Exploit
vendor:
XOOPS CMS
by:
Felipe Andrian Peixoto
CVSS
HIGH
SQL Injection
89
CWE
Product Name: XOOPS CMS
Affected Version From: 2.5.9
Affected Version To: 2.5.9
Patch Exists: NO
Related CWE: N/A
CPE: a:xoops:xoops_cms
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 7 and Gnu/Linux
2019

Sql Injection on XOOPS CMS v.2.5.9

A SQL injection vulnerability exists in XOOPS CMS v.2.5.9. An attacker can send a maliciously crafted request to the gerar_pdf.php script in the patch/modules/patch/ directory, which can be accessed by using the 'inurl:gerar_pdf.php inurl:modules' dork. This can allow an attacker to execute arbitrary SQL commands on the underlying database.

Mitigation:

Input validation should be used to prevent SQL injection attacks. Additionally, the application should be configured to use parameterized queries.
Source

Exploit-DB raw data:

[+] Sql Injection on XOOPS CMS v.2.5.9

[+] Date: 12/05/2019

[+] Risk: High

[+] CWE Number : CWE-89

[+] Author: Felipe Andrian Peixoto

[+] Vendor Homepage: https://xoops.org/

[+] Contact: felipe_andrian@hotmail.com

[+] Tested on: Windows 7 and Gnu/Linux

[+] Dork: inurl:gerar_pdf.php inurl:modules // use your brain ;)

[+] Exploit : 

        http://host/patch/modules/patch/gerar_pdf.php?cid= [SQL Injection]

   
[+] EOF