source: http://www.securityfocus.com/bid/27592/info Codice CMS is prone to an SQL-injection vulnerability because it fails to adequately sanitize user-supplied data. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. The following exploit information is available: Passing: username: admin' or 1=1/* password: something will bypass the authentication process.
Related ExploitsTrying to match CVEs (1): CVE-2008-0651
Trying to match OSVDBs (1): 41439
Other Possible E-DB Search Terms: Codice CMS
|2009-03-23||Codice CMS 2 - Command Execution (via SQL Injection)||darkjoker|