CVE-2008-2817

nitro_web_gallery < 1.4.3 - SQL Injection via CatId Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-2817. PoCs published by Mr.SQL.

AI-analyzed exploit summary This exploit demonstrates a SQL injection vulnerability in NiTrO Web Gallery versions 1.3 to 1.43 via the 'CatId' parameter in 'albums.php'. It allows an attacker to extract user credentials (username, password, email) from the 'tblUsers' table.

Description

SQL injection vulnerability in albums.php in NiTrO Web Gallery 1.4.3 and earlier allows remote attackers to execute arbitrary SQL commands via the CatId parameter in a show action.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/5830

This exploit demonstrates a SQL injection vulnerability in NiTrO Web Gallery versions 1.3 to 1.43 via the 'CatId' parameter in 'albums.php'. It allows an attacker to extract user credentials (username, password, email) from the 'tblUsers' table.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: NiTrO Web Gallery V1.3 - V1.43
No auth needed
Prerequisites: Target must be running NiTrO Web Gallery V1.3 - V1.43 · The 'albums.php' page must be accessible
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (3)

Core 3
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5830
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43100
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29753

Scores

EPSS 0.0041
EPSS Percentile 61.8%

Details

CWE
CWE-89
Status published
Products (1)
nitropowered/nitro_web_gallery < 1.4.3
Published Jun 23, 2008
Tracked Since Feb 18, 2026