id SQL Injection in WikLink

Summary

Vulnerability
id SQL Injection in WikLink
Discovered
2010.12.24
Last Update
n/a n/a
ID
EV0171
CVE
n/a
Risk Level
medium
Type
SQL Injection
Status
Unpatched. Vendor notified. No reply from developer(s).
Vendor
n/a
Vulnerable Software
WikLink (http://sourceforge.net/projects/wiklink/)
Version
0.1.3
PoC/Exploit
Available
Solution
Not available
Discovered by
Aliaksandr Hartsuyeu (eVuln.com)

Description

SQL Injection found in WikLink (http://sourceforge.net/projects/wiklink/) script.

SQL Injection
It is possible to inject arbitrary SQL query using id parameter in getURL.php script.

Parameter id used in SQL query without any sanitation.

Condition: magic_quotes: off

PoC/Exploit

SQL Injection PoC code.

SQL Injection example: http://website/wiklink/getURL.php?id=-1' union select 1111/*

Solution.

Solution for "id SQL Injection in WikLink" is not available. Check vendor's website for updates.