CVE-2007-4491

Gurur haber 2.0 - SQL Injection via id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-4491. PoCs published by dumenci.

AI-analyzed exploit summary This exploit demonstrates an SQL injection vulnerability in Gurur Haber by manipulating the 'id' parameter in the URL to extract user credentials from the 'uyeler' table. The attack leverages a UNION-based SQLi to retrieve sensitive data without authentication.

Description

SQL injection vulnerability in uyeler2.php in Gurur haber 2.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by dumenci · textwebappsphp
https://www.exploit-db.com/exploits/30511

This exploit demonstrates an SQL injection vulnerability in Gurur Haber by manipulating the 'id' parameter in the URL to extract user credentials from the 'uyeler' table. The attack leverages a UNION-based SQLi to retrieve sensitive data without authentication.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Gurur Haber (version unspecified)
No auth needed
Prerequisites: Access to the vulnerable endpoint · Knowledge of the database schema
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (5)

Core 5
Core References
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3049
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/477121/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/38333
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36114
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/25368

Scores

EPSS 0.0056
EPSS Percentile 68.6%

Details

CWE
CWE-89
Status published
Products (1)
gurur_haber/gurur_haber 2.0
Published Aug 23, 2007
Tracked Since Feb 18, 2026