Description
microASP Portal+ CMS contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code into the explode_tree parameter. Attackers can send crafted requests to pagina.phtml with SQL injection payloads using extractvalue and concat functions to extract sensitive database information like the current database name.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
Felipe Andrian Peixoto
References
www.exploit-db.com/exploits/46799 (ExploitDB-46799)
www.microasp.it/ (Official Product Homepage)
www.vulncheck.com/...ortal-cms-sql-injection-via-paginaphtml (VulnCheck Advisory: microASP Portal+ CMS SQL Injection via pagina.phtml)