Multiple SQL Injection Vulnerabilities in DedeCMS
Release date: 2011-12-30
Updated on:
Affected Systems:
Dedecms <5.7
Description:
--------------------------------------------------------------------------------
Bugtraq id: 51211
Cve id: CVE-2011-5200
DedeCms is a free PHP website content management system.
DedeCMS 5.6 has multiple SQL injection vulnerabilities. php, members. php, book. php parameter passing allows remote attackers to exploit these vulnerabilities to control applications, access or modify data, and exploit other vulnerabilities in lower-layer databases.
<* Source: nashms
Link: http://www.exploit-db.com/exploits/18292/
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
The following test method is provided:
[$] Dorks: inurl: "id" "DedeCMS Error Warning! "
[#] Vulnerable Files:
/List. php? Id = [SQL]
/Members. php? Id = [SQL]
/Book. php? Id = [SQL]
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>
</No Priv8, Everything is Public>
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>>>>
# Cyberwh.org
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Dedecms
-------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.dedecms.com/products/dedecms/