CVE-2008-2393

EntertainmentScript 1.4.0 - SQL Injection via play.php id Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2393. PoCs published by Mr.SQL.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in EntertainmentScript V1.4.0 via the 'id' parameter in play.php. It extracts user credentials (username, password, and email) from the database using a UNION-based SQLi attack.

Description

SQL injection vulnerability in play.php in EntertainmentScript 1.4.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/5654

This exploit demonstrates a SQL injection vulnerability in EntertainmentScript V1.4.0 via the 'id' parameter in play.php. It extracts user credentials (username, password, and email) from the database using a UNION-based SQLi attack.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: EntertainmentScript V1.4.0
No auth needed
Prerequisites: Access to the vulnerable play.php endpoint
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5654
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42538
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29284
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30311

Scores

EPSS 0.0046
EPSS Percentile 64.4%

Details

CWE
CWE-89
Status published
Products (1)
entertainmentscript/entertainmentscript 1.4.0
Published May 21, 2008
Tracked Since Feb 18, 2026