cve/2008/CVE-2008-5589.md

19 lines
818 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2008-5589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5589)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
SQL injection vulnerability in processlogin.asp in Katy Whitton RankEm allows remote attackers to execute arbitrary SQL commands via the (1) txtusername parameter (aka username field) or the (2) txtpassword parameter (aka password field). NOTE: some of these details are obtained from third party information.
### POC
#### Reference
- http://securityreason.com/securityalert/4746
- https://www.exploit-db.com/exploits/7350
#### Github
No PoCs found on GitHub currently.