vendor:
Yet Another CMS
by:
Stefan Schurtz
8.8
CVSS
HIGH
SQL Injection & XSS
89
CWE
Product Name: Yet Another CMS
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE: N/A
CPE: a:yetanothercms:yet_another_cms
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
Yet Another CMS 1.0 SQL Injection & XSS vulnerabilities
Yet Another CMS 1.0 is prone to multiple SQL Injection and XSS vulnerabilities. The vulnerability is due to the application's failure to properly sanitize user-supplied input before using it in an SQL query. An attacker can exploit this vulnerability by submitting malicious SQL statements in the 'pattern' parameter of the 'search.php' script. This can allow the attacker to view, add, modify or delete records in the back-end database.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to dynamically construct SQL queries. Additionally, parameterized queries should be used to prevent SQL injection attacks.