Description
Next Click Ventures RealtyScript 4.0.2 contains SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting arbitrary SQL code through the GET parameter 'u_id' in /admin/users.php and the POST parameter 'agent[]' in /admin/mailer.php. Attackers can exploit time-based blind SQL injection techniques to extract sensitive database information or cause denial of service through sleep-based payloads.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
References
www.exploit-db.com/exploits/38497 (ExploitDB-38497)
www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5270.php (Vulnerability Advisory)
www.vulncheck.com/...injection-via-u-id-and-agent-parameters (VulnCheck Advisory: RealtyScript 4.0.2 SQL Injection via u_id and agent Parameters)