Hot Links SQL version 3.2.0 suffers from a remote SQL injection vulnerability in report.cgi.
60578be5a556d4074dde26d49c491c63878dc4ab271eda716681490ac13b26a4
New eVuln Advisory:
report.cgi SQL inj in Hot Links SQL
http://evuln.com/vulns/141/summary.html
-----------Summary-----------
eVuln ID: EV0141
Software: Hot Links SQL 3
Vendor: Mrcgiguy
Version: 3.2.0
Critical Level: medium
Type: SQL injection
Status: Unpatched. No reply from developer(s)
PoC: Available
Solution: Not available
Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )
--------Description--------
SQL injection found in id parameter of report.cgi script. This can be used to make any SQL query by injecting arbitrary SQL code.
This vulnerability found in CGI version of Hot Links SQL 3.
--------PoC/Exploit--------
report.cgi id SQL injection exploit
Parameter id doesn't pass SQL-injection filter.
SQL injection example
url: http://somesite/report.cgi?id=999; or 'a'='a
---------Solution----------
Not available
----------Credit-----------
Vulnerability discovered by Aliaksandr Hartsuyeu
http://evuln.com/tool/web-security.html - Web Security Analyzer