CVE-2008-2754
eFiction 3.0 and 3.4.3 - SQL Injection via toplists.php list Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2008-2754. PoCs published by Mr.SQL.
AI-analyzed exploit summary This is a writeup describing a SQL injection vulnerability in eFiction 3.0 via the 'toplists.php' script. It provides a proof-of-concept SQLi payload but does not include executable exploit code.
Description
SQL injection vulnerability in toplists.php in eFiction 3.0 and 3.4.3, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the list parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/5785
This is a writeup describing a SQL injection vulnerability in eFiction 3.0 via the 'toplists.php' script. It provides a proof-of-concept SQLi payload but does not include executable exploit code.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:
eFiction 3.0
No auth needed
Prerequisites:
Access to the 'toplists.php' endpoint with the 'list' parameter
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (4)
Core 4
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30606
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42998
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5785
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29658
Scores
EPSS
0.0049
EPSS Percentile
65.5%
Details
CWE
CWE-89
Status
published
Products (2)
efiction/efiction
3.0
efiction/efiction
3.4.3
Published
Jun 18, 2008
Tracked Since
Feb 18, 2026