CVE-2009-3117

Snow Hall Silurus System 1.0 - SQL Injection via ID Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3117. PoCs published by Mr.SQL.

AI-analyzed exploit summary This exploit demonstrates a remote SQL injection vulnerability in Silurus Classifieds System via the 'category.php' ID parameter. It allows an attacker to extract sensitive information such as usernames and passwords from the 'Profiles' and 'Admins' tables.

Description

SQL injection vulnerability in category.php in Snow Hall Silurus System 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Mr.SQL · textwebappsphp
https://www.exploit-db.com/exploits/9538

This exploit demonstrates a remote SQL injection vulnerability in Silurus Classifieds System via the 'category.php' ID parameter. It allows an attacker to extract sensitive information such as usernames and passwords from the 'Profiles' and 'Admins' tables.

Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target: Silurus Classifieds System
No auth needed
Prerequisites: Access to the target URL with the vulnerable 'category.php' endpoint
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (4)

Core 4
Core References
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/2467
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/52904
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9538
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/36124

Scores

EPSS 0.0024
EPSS Percentile 47.6%

Details

CWE
CWE-89
Status published
Products (1)
snowhall/silurus_system 1.0
Published Sep 09, 2009
Tracked Since Feb 18, 2026