Description
202CMS v10 beta contains a blind SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the log_user parameter. Attackers can send POST requests to index.php with crafted SQL payloads using time-based blind injection techniques to extract sensitive database information.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
References
www.exploit-db.com/exploits/46579 (ExploitDB-46579)
sourceforge.net/projects/b202cms/ (Official Product Homepage)
www.vulncheck.com/...v10-beta-sql-injection-via-register-php (VulnCheck Advisory: 202CMS v10 beta SQL Injection via register.php)