Description
Multiple SQL injection vulnerabilities in files/login.asp in JiRo's Banner System (JBS) 2.0, and possibly JiRo's Upload Manager (aka JiRo's Upload System or JUS), allow remote attackers to execute arbitrary SQL commands via the (1) Username (aka Login or Email) or (2) Password field.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Aria-Security Team · textwebappsasp
https://www.exploit-db.com/exploits/30775
References (6)
Core 6
Core References
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3384
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/26479
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/483859/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/38740
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/38741
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/27713
Scores
EPSS
0.0046
EPSS Percentile
64.3%
Details
CWE
CWE-89
Status
published
Products (1)
jiro/banner_system
2.0
Published
Nov 22, 2007
Tracked Since
Feb 18, 2026