Advertisement






XAMPP 'cds.php' SQL Injection vulnerability

CVE Category Price Severity
CVE-XXXX-XXXX CWE-89 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2008-10-07
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2008100018

Below is a copy:

Title XAMPP 'cds.php' SQL Injection vulnerability

Provided and/or Discovered By:
Jaykishan Nirmal from Aujas Networks


Release Date:
3rd October, 2008

Class

Input Validation Error

Risk
High

Remotely Exploitable
Yes

Locally Exploitable
Yes

Vulnerable File
http://www.example.com/xampp/cds.php

Exploit/Proof of Concept:
http://www.example.com/xampp/cds.php?action=del&id=1 or 1

Technical Details
In PHP-script called 'cds.php', parameter 'id' is vulnerable to SQL Injection attacks.
Input passed to the 'id' parameter in 'cds.php' isn't properly sanitized before being used in a
SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code
which can delete all CD record(s) stored in database.
This issue is due to a failure of the application to properly sanitize user-supplied input prior to
including it in dynamically generated Web content.

Vulnerable Versions:
XAMPP v1.6.8 (Earlier versions might be affected)

Platform:
Windows (Others might be affected)

Reference(s)
XAMPP Home Page – http://www.apachefriends.org/en/xampp.html
SecurityFocus – http://www.securityfocus.com/bid/31564

Report Timeline(s)
02-10-2008: Aujas Networks notifies XAMPP development team about vulnerability
02-10-2008: Vendor response

Contact
Jaykishan.nirmal [at] aujas [dot] com

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum