Release date:
Updated on:
Affected Systems:
Cotonti
Description:
--------------------------------------------------------------------------------
Bugtraq id: 54147
Cotonti is an open source PHP content management framework.
Cotonti 0.6.23 does not properly filter user input used in SQL queries. There is an SQL injection vulnerability in implementation. After successful exploitation, attackers can control the application, access or modify data or take advantage of other vulnerabilities in the underlying database.
<* Source: Akastep
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Http://www.example.com/admin.php? M = hits & amp; f = year & amp; v = 1 [SQLi]
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Cotonti
-------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.cotonti.com/