enVivo!CMS suffers from a SQL injection vulnerability.
efe2a33116216481775b08a490a7a7363c061437d7b4cb3a46871f834910d1a1
Dear bugtraq@securityfocus.com,
durito [damagelab] -durito[at]mail[dot]ru- reported SQL injection
vulnerability in enVivo!CMS through ID parameter of default.asp.
Example:
https://www.example.com/default.asp?action=article&ID=-1+or+1=(SELECT+TOP+1+username+from+users)--
Original message (in Russian): https://securityvulns.ru/Rdocument425.html
--
https://securityvulns.com/
/\_/\
{ , . } |\
+--oQQo->{ ^ }<-----+ \
| ZARAZA U 3APA3A } You know my name - look up my number (The Beatles)
+-------------o66o--+ /
|/