[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

JobHut <= 1.2 (pk) Remote SQL Injection Vulnerability

Author
K-159
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-4976
Category
web applications
Date add
29-03-2009
Platform
unsorted
=====================================================
JobHut <= 1.2 (pk) Remote SQL Injection Vulnerability
=====================================================


-----------------------------------------------------------------------------------------
[ECHO_ADV_108$2009] JobHut <= 1.2 (pk) Remote Sql Injection Vulnerability
-----------------------------------------------------------------------------------------

Author       : K-159
Date         : March, 30 th 2009
Location     : Jakarta, Indonesia
Critical Lvl : Moderate
Impact       : Exposure of sensitive information
Where        : From Remote
---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : JobHut
version     : <= 1.2
Vendor      : http://jobhut.spranger.us/
Description :


JobHut is an open source job board solution.

--------------------------------------------------------------------------

Vulnerability:
~~~~~~~~~~~~

Input passed to the "pk" parameter in browse.php page is not properly verified before being used 
into sql queries.This vulnerability can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

Poc/Exploit:
~~~~~~~

http://www.example.com/[path]/browse.php?pk=-1 union select @@version,2--


Dork:
~~~
Google : N/A


Solution:
~~~~~
- Edit the source code to ensure that input is properly verified.

Timeline:
~~~~~~~

- 21 - 03 - 2009 bug found
- 26 - 03 - 2009 vendor contacted
- 26 - 03 - 2009 vendor response
- 30 - 03 - 2009 advisory release
---------------------------------------------------------------------------




#  0day.today [2024-07-02]  #