www.eVuln.com advisory:

"fold" and "site" SQL Injections in WikLink

Summary: http://evuln.com/vulns/172/summary.html 

Details: http://evuln.com/vulns/172/description.html 



-----------Summary-----------

eVuln ID: EV0172

Software: WikLink

Vendor: n/a

Version: 0.1.3

Critical Level: medium

Type: SQL Injection

Status: Unpatched. No reply from developer(s)

PoC: Available

Solution: Not available

Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )



--------Description--------

It is possible to inject arbitrary SQL query using "fold" and "site" parameters 
in "editCategory.php" and "editSite.php"  scripts.



Parameters "fold" and "site" are used in SQL query without any sanitation.



Condition: magic_quotes: off



--------PoC/Exploit--------

PoC code is available at:

http://evuln.com/vulns/172/exploit.html 



---------Solution----------

Not available



----------Credit-----------

Vulnerability discovered by Aliaksandr Hartsuyeu

http://evuln.com/auth-bypass/ - recent authentication bypass evuln advisories.

Reply via email to