ArticleSetup 1.1 SQL Injection

2012.09.04
Credit: HTTPCS
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

HTTPCS Advisory : HTTPCS86 Product : ArticleSetup Version : 1.1 Date : 2012-09-03 Criticality level : Highly Critical Description : A vulnerability has been discovered in ArticleSetup, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 'cat' parameter to '/feed.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /feed.php Variables : cat=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs86 Credit : HTTPCS [Web Vulnerability Scanner] HTTPCS Advisory : HTTPCS87 Product : ArticleSetup Version : 1.1 Date : 2012-09-03 Criticality level : Highly Critical Description : A vulnerability has been discovered in ArticleSetup, which can be exploited by malicious people to conduct SQL injection attacks. Input passed via the 's' parameter to '/search.php' is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Page : /search.php Variables : s=[VulnHTTPCS] Type : SQLI Method : GET Solution : References : https://www.httpcs.com/advisory/httpcs87 Credit : HTTPCS [Web Vulnerability Scanner] _______________________________________________ Twitter : http://twitter.com/HTTPCS_ Free web vulnerability scanner HTTPCS : https://www.httpcs.com/

References:

https://www.httpcs.com/advisory/httpcs87


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top