SQL injection in Abstract - #VU5914

 

SQL injection in Abstract - #VU5914

Published: March 6, 2017


Vulnerability identifier: #VU5914
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: N/A
CWE-ID: CWE-89
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Landshark Labs
Affected software:
Abstract

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary SQL queries in web application database.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via "pid" HTTP GET parameter to "/index.php" script. A remote attacker can send a specially crafted HTTP GET request to vulnerable script and execute arbitrary SQL queries in web application database.

Successful exploitation of the vulnerability may allow an attacker to gain complete control over affected website.

PoC-code

http://[host]/index.php?option=com_abstract&view=conferences&layout=detail&pid=[SQL]

Remediation

The vulnerable version is Abstract v2.1, other versions may also be affected.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Sources