Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   evoTopsites Vendors:   Evo-Dev
evoTopsites Input Validation Flaw in 'cat_id' and 'id' Parameters Permit SQL Injection Attacks
SecurityTracker Alert ID:  1016062
SecurityTracker URL:
CVE Reference:   CVE-2006-2339   (Links to External Site)
Updated:  Dec 5 2009
Original Entry Date:  May 11 2006
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  

Description:   Hamid Ebadi reported a vulnerability in evoTopsites. A remote user can inject SQL commands.

The 'index.php' does not properly validate user-supplied input in the 'cat_id' and 'id' parameters. If magic_quotes_gpc is disabled, a remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

A demonstration exploit URL is provided:


evoTopsites Pro is also affected.

The original advisory is available at:

Impact:   A remote user can execute SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  evoTopsites SQL injection

evoTopsites SQL injection
evoTopsites offers 15 methods of ranking sites,
unlimited categories, mailing list, template
system,inactivity monitor,
sites can have multiple banners, users can have
multiple sites, permission system,languange pack,
trend recording,
comments, dynamic and static buttons, user validation,
powerful search and much more!

The information has been provided by Hamid Ebadi 
The original article can be found at:

Vulnerable Systems:
evoTopsites Pro

Detail ::

Input passed to the "cat_id" ,"id" parameter in
"index.php" is not properly sanitised before being
used in a SQL query.
This can be exploited to manipulate SQL queries.

you can even test the exploit here :
"evoTopsite Free Demo"'%20union%20select%20password%20from%20evots_user%20%20where%20'1'='1

note: Successful exploitation requires that
"magic_quotes_gpc" is disabled.

Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC