Description
EdTv 2 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the 'id' parameter. Attackers can send GET requests to the admin/edit_source endpoint with crafted SQL UNION statements to extract database information including schema names, user credentials, and version details.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Ihsan Sencan
References
www.exploit-db.com/exploits/45849 (ExploitDB-45849)
www.vulncheck.com/...ies/edtv-sql-injection-via-id-parameter (VulnCheck Advisory: EdTv 2 SQL Injection via id Parameter)