0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Pragyan CMS 3.0 SQL Injection Vulnerability
Advisory: SQL injection vulnerability in Pragyan CMS v.3.0 Author: Steffen Rösemann Affected Software: Pragyan CMS v.3 Vendor URL: https://github.com/delta/pragyan, http://delta.nitt.edu/ Vendor Status: vendor did not respond after initial communication CVE-ID: - ========================== Vulnerability Description: ========================== Pragyan CMS v. 3 suffers from a SQL injection vulnerability that can be abused even by unauthenticated attackers. ================== Technical Details: ================== The user-profile of registered users of Pragyan CMS v.3 is vulnerable to SQL injection attacks. A user-profile can be found in the following location of a common Pragyan CMS installation: http://{TARGET}/user:1 Exploit-Example: http:// {TARGET}/user:1%27+and+1=2+union+select+database%28%29,version%28%29,3+--+ ========= Solution: ========= Vendor notified, did not respond after initial communication. If you use Pragyan CMS v.3, please locate the file userprofile.lib.php and use my patch (see [5], usage at your own risk!). ==================== Disclosure Timeline: ==================== 18-Jan-2015 – found the vulnerability 19-Jan-2015 - informed the developers (see [3]) 19-Jan-2015 – release date of this security advisory [without technical details] 19-Jan-2015 - forked the project to keep it available/researchable in its current state for other researchers [4] 03-Feb-2015 - release date of this security advisory 03-Feb-2015 - provided a patch for vulnerability (see [5]) 03-Feb-2015 - send to FullDisclosure # 0day.today [2024-12-26] #