The provided text describes an SQL injection vulnerability in Pligg CMS 1.1.3, where the 'range' parameter in 'cloud.php' is not properly sanitized. This allows attackers to manipulate SQL queries, potentially leading to data access, modification, or further exploitation of the underlying database.
Classification
Writeup 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Pligg CMS 1.1.3
No auth needed
Prerequisites:Access to the vulnerable 'cloud.php' endpoint