1.A SQL Injection vulnerability is detected in the BananaDance Wiki B2.2 Content Management System.The vulnerability allows an attacker (remote) or local privileged moderator/admin user account to execute own SQL commands on the affected application dbms. The sql injection vulnerability is located in user management module with the bound vulnerable alpha listing parameter. Successful exploitation of the vulnerability results in dbms & application compromise. Exploitation requires no user interaction & without privileged user account.
Vulnerable Module(s):
[+] User Management
Vulnerable Parameter(s):
[+] alpha
2.Multiple persistent input validation vulnerabilities are detected in the BananaDance Wiki B2.2 Content Management System. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent) of the
vulnerable module. The persistent vulnerabilities are located in the user, banned user, badge module listing with the bound vulnerable username and email parameters. Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action (view listing) & a registered low privileged web application user account.
Vulnerable Module(s):
[+] Add User - Listing
[+] Banned User - Listing
[+] Badges - Listing
Proof of Concept:
-================
1.1
The sql injection vulnerability can be exploited by local privileged user accounts and moderators.For demonstration or reproduce ...
1.2
The persistent input validation vulnerabilities can be exploited by remote attacker with low privileged application user account and low required user inter action. For demonstration or reproduce ...