Description
Victor CMS version 1.0 contains a SQL injection vulnerability in the 'post' parameter on post.php that allows remote attackers to manipulate database queries. Attackers can exploit this vulnerability by sending crafted UNION SELECT payloads to extract database information through boolean-based, error-based, and time-based injection techniques.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
BKpatron
References
www.exploit-db.com/exploits/48451 (ExploitDB-48451)
github.com/VictorAlagwu/CMSsite (Victor CMS GitHub Repository)
www.vulncheck.com/advisories/victor-cms-post-sql-injection (VulnCheck Advisory: Victor CMS 1.0 - 'post' SQL Injection)