0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Viscacha Forum CMS v0.8.1.1 - Multiple Web Vulnerabilities
Title: ====== Viscacha Forum CMS v0.8.1.1 - Multiple Web Vulnerabilities Introduction: ============= Viscacha is a free bulletin board system with an integrated CMS. The intention of the software engineers is to combine the current standards with new and user friendly features. The system supports packages for easily extending the core system. Viscacha is a free bulletin board system with an integrated content management system. The intention of the software engineers is to combine the current standards with new and user friendly features. The system supports packages (plugins and components) for easily extending the core system. Viscacha uses an database abstraction layer to support as many databases as possible. With this software you can easily set up a complete (personal) homepage. The CMS extends the bulletin board system to have a homepage which is connected to the community. (Copy of the vendor Homepage: http://www.viscacha.org ) Details: ======== 1.1 A remote SQL Injection vulnerability (POST) is detected in Viscacha Bulletin Board CMS v0.8.1.1. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. The vulnerability is located on the bbcode module of the forum application. Vulnerable Module(s): [+] BBCode - Tags & BB-Code | Change or Example --- SQL Exception Logs --- Fatal error: DB ERROR 1064: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ` at line 1 File: /home/opencms/public_html/demo/viscacha/admin/bbcodes.php on line 1164 Query: SELECT * FROM v_bbcode WHERE bbcodetag = `sd`AND twoparams = `0`AND in /home/server/public_html/cms/viscacha/classes/database/mysql.inc.php on line 151 Fatal error: DB ERROR 1064: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ` at line 1 File: /home/server/public_html/cms/viscacha/admin/bbcodes.php on line 1164 Query: SELECT * FROM v_bbcode WHERE bbcodetag = `sd` AND twoparams = `0` AND in /home/opencms/public_html/demo/viscacha/classes/database/mysql.inc.php on line 151 Fatal error: DB ERROR 1064: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near` at line 1 File: /home/server/public_html/cms/viscacha/admin/bbcodes.php on line 1164 Query: SELECT * FROM v_bbcode WHERE bbcodetag = `-1`AND twoparams = `0` AND in /home/server/public_html/cms/viscacha/classes/database/mysql.inc.php on line 151 1.2 Multiple persistent input validation vulnerabilities is detected in Viscacha Bulletin Board CMS v0.8.1.1. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin/user) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] Private Messages System - Text Input Field [+] Zensur - Bad Word Input Field [+] Kommentar - Portal Input Field Text & Topic # 0day.today [2024-11-15] #