header-logo
Suggest Exploit
vendor:
Informix
by:
Unknown
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Informix
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: Informix Web Datablade Module
Metasploit:
Other Scripts:
Platforms Tested: Windows NT, Linux, Unix-like systems
Unknown

Web Datablade Module for Informix SQL SQL Injection Vulnerability

The Web Datablade Module for Informix SQL allows for the injection of SQL commands into any page request, potentially leading to the disclosure of sensitive information or unauthorized access to the database. An additional issue exists within the HTTP Basic Authentication process used by Web Datablade, but detailed exploitation information is not available.

Mitigation:

It is recommended to apply the latest patches and updates for the affected versions of Web Datablade. Additionally, input validation and parameterized queries should be implemented to prevent SQL injection attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/4496/info

Informix is an enterprise database distributed and maintained by IBM. The Web Datablade Module for Informix SQL, dynamically generates HTML content based on Database data. Web Datablade is available for Apache, IIS, and Netscape web servers, and a generic CGI version is provided for alternative servers. It will execute under Windows NT, Linux and many Unix-like systems.

A vulnerability has been reported in some versions of Web Datablade. Reportedly, it is possible to inject SQL commands into any page request processed by Web Datablade. This may result in the disclosure of sensitive information or increased access to the database.

There have been reports that a similar issue exists within the HTTP Basic Authentication process used by Web Datablade, which also submits queries to the database. However, detailed exploitation information is not available for this case.

http://victim.com/site/' UNION ALL SELECT FileToClob('/etc/passwd','server')::html,0 FROM sysusers WHERE username = USER --/.html