Description
Multiple SQL injection vulnerabilities in the selectUserIdByLoginPass function in seotoaster_core/application/models/LoginModel.php in Seotoaster 1.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) login parameter to sys/login/index or (2) memberLoginName parameter to sys/login/member.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Stefan Schurtz · textwebappsphp
https://www.exploit-db.com/exploits/18246
References (5)
Core 5
Core References
Various Sources x_refsource_misc
http://www.infoserve.de/system/files/advisories/INFOSERVE-ADV2011-06.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/77736
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/71843
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/46881
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18246
Scores
EPSS
0.0161
EPSS Percentile
81.8%
Details
CWE
CWE-89
Status
published
Products (3)
seotoaster/seotoaster
1.8.2
seotoaster/seotoaster
1.8.3
seotoaster/seotoaster
< 1.9
Published
Oct 25, 2012
Tracked Since
Feb 18, 2026