INVOhost SQL Injection Vulnerability
Posted on 25 March 2010
==================================== INVOhost SQL Injection Vulnerability ==================================== ##########################[Andr?s G?mez]########################## # Exploit Title : INVOhost SQL Injection # Author : Andres Gomez # Software Link : http://www.invohost.com/ # Contact : gomezandres@adinet.com.uy<mailto:gomezandres@adinet.com.uy> # Dork : "Powered by INVOhost" ######################################################################## # An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the # integrity of your database and/or expose sensitive information. ######################################################################## # Example 1: http://server/site.php?id=%27 # Example 2: http://server/site.php?newlanguage=%00' # Other files vulnerables: faq.php & manuals.php ######################################################################## # Malicious users may inject SQL querys into a vulnerable # application to fool a user in order to gather data from them or see sensible information. ######################################################################## # Solution: # $_GET = preg_replace("|([^ws'])|i",'',$_GET); # $_POST = preg_replace("|([^ws'])|i",'',$_POST); # Add them to your template index.php after the first <?php deceleration. ######################################################################## # Inj3ct0r.com [2010-03-25]