Papoo CMS 3.6 - SQL Injection

2007-06-29 / 2007-06-30
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Papoo Content Management System Backend SQL Injection Jun 24 2007 ________________________________________________________________________ _______ * Product Papoo Content Management System * Vulnerable Versions Papoo 3.6 and maybe prior * Vendor Status The Vendor was notified and the issue was fixed. A patch is available at http://www.papoo.de/index/menuid/204/reporeid/215 * Details The Papoo Content Management System is prone to an SQL Injection that can be exploited by any user with access to the backend system and with privileges to modify the navigation menu. The application will get the read and publish privileges for every usergroup and for every menu item that is meant to be edited and specified by the `selmenuid' GET parameter. It fails to sanitize the value of the parameter. * Impact Attackers may be able to execute arbitrary SQL queries. * Exploit No exploit required. ________________________________________________________________________ _______ Nico Leidecker - http://www.leidecker.info _____________________________________________________________________ Der WEB.DE SmartSurfer hilft bis zu 70% Ihrer Onlinekosten zu sparen! http://smartsurfer.web.de/?mc=100071&distributionid=000000000066


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top