apemCMS - SQL Injection

Author: Ariko-Security
type: webapps
platform: php
port: 
date_added: 2010-02-10  
date_updated:   
verified: 1  
codes: OSVDB-64618  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 11411.txt  
============ { Ariko-Security - Advisory #1/2/2010 } =============

       SQL injection vulnerability in apemCMS

Vendor's Description of Software:
# http://apem.com.pl/?sc=oferta

Dork:
#Powered by apemCMS

Application Info:
# Name: apemCMS
# Versions: ALL

Vulnerability Info:
# Type: SQL injection Vulnerability
# Risk: High

Fix:
# 11.FEB Fixed

It was found that apemCMS does not validate properly the "id" parameter
 value.

Solution:
# Input validation of "id" parameter should be corrected.


Vulnerability:
# http://server/?mod=view_default&id=68[SQLi]

Credit:
# Discoverd By: MG
# Website: http://Ariko-security.com
# Contacts: support[-at-]ariko-security.com

Ariko-Security
vuln@ariko-security.com
tel.: +48512946012 (Mo-Fr 10.00-20.00 CET)