CVE-2008-2754

eFiction 3.0 and 3.4.3 - SQL Injection via toplists.php list Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2754. PoCs published by Mr.SQL.

AI-analyzed exploit summary This is a writeup describing a SQL injection vulnerability in eFiction 3.0 via the 'toplists.php' script. It provides a proof-of-concept SQLi payload but does not include executable exploit code.

Description

SQL injection vulnerability in toplists.php in eFiction 3.0 and 3.4.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the list parameter.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/5785

This is a writeup describing a SQL injection vulnerability in eFiction 3.0 via the 'toplists.php' script. It provides a proof-of-concept SQLi payload but does not include executable exploit code.

Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: eFiction 3.0
No auth needed
Prerequisites: Access to the 'toplists.php' endpoint with the 'list' parameter
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30606
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42998
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5785
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29658

Scores

EPSS 0.0049
EPSS Percentile 65.5%

Details

CWE
CWE-89
Status published
Products (2)
efiction/efiction 3.0
efiction/efiction 3.4.3
Published Jun 18, 2008
Tracked Since Feb 18, 2026