Exploit phpWebSite 0.9.3 - 'links.php' SQL Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
32553
Проверка EDB
  1. Пройдено
Автор
BEENU ARORA
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2008-6266
Дата публикации
2008-10-31
Код:
source: https://www.securityfocus.com/bid/32011/info

phpWebSite is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

We don't know which versions of phpWebSite are affected. We will update this BID as more information emerges.

NOTE: The vendor refutes this issue, stating that the vulnerable script has not been present in the application since either the 0.8.x or 0.9.x releases. 

http://www.example.com/links.php?op=viewlink&cid=5+and+1=2+union+select+concat(version(),0x3a,database(),0x3a,user())--
 
Источник
www.exploit-db.com

Похожие темы