New eVuln Advisory: report.cgi SQL inj in Hot Links SQL http://evuln.com/vulns/141/summary.html -----------Summary----------- eVuln ID: EV0141 Software: Hot Links SQL 3 Vendor: Mrcgiguy Version: 3.2.0 Critical Level: medium Type: SQL injection Status: Unpatched. No reply from developer(s) PoC: Available Solution: Not available Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ ) --------Description-------- SQL injection found in id parameter of report.cgi script. This can be used to make any SQL query by injecting arbitrary SQL code. This vulnerability found in CGI version of Hot Links SQL 3. --------PoC/Exploit-------- report.cgi id SQL injection exploit Parameter id doesn't pass SQL-injection filter. SQL injection example url: http://somesite/report.cgi?id=999; or 'a'='a ---------Solution---------- Not available ----------Credit----------- Vulnerability discovered by Aliaksandr Hartsuyeu http://evuln.com/tool/web-security.html - Web Security Analyzer