CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Lifecycle Timeline
4Description
Next Click Ventures RealtyScript 4.0.2 contains SQL injection vulnerabilities that allow unauthenticated attackers to manipulate database queries by injecting arbitrary SQL code through the GET parameter 'u_id' in /admin/users.php and the POST parameter 'agent[]' in /admin/mailer.php. Attackers can exploit time-based blind SQL injection techniques to extract sensitive database information or cause denial of service through sleep-based payloads.
Analysis
SQL injection vulnerabilities in RealtyScript 4.0.2 allow unauthenticated remote attackers to manipulate database queries through vulnerable parameters in admin panel files (/admin/users.php and /admin/mailer.php). Attackers can extract sensitive database information using time-based blind SQL injection or cause denial of service. A public proof-of-concept exploit is available on Exploit-DB, though the vulnerability is not currently in CISA's KEV catalog.
Technical Context
RealtyScript (CPE: cpe:2.3:a:next_click_ventures:realtyscripts:*:*:*:*:*:*:*:*) is a PHP-based real estate listing management system. The vulnerability stems from improper input validation (CWE-89: SQL Injection) where user-supplied data in the 'u_id' GET parameter and 'agent[]' POST parameter is directly concatenated into SQL queries without sanitization. This allows injection of arbitrary SQL commands, including time-based payloads using SLEEP() functions for blind extraction of data.
Affected Products
Next Click Ventures RealtyScript version 4.0.2 is confirmed vulnerable. The CPE notation (cpe:2.3:a:next_click_ventures:realtyscripts:*:*:*:*:*:*:*:*) suggests all versions may be affected, though only 4.0.2 is explicitly confirmed in the EUVD data. The vulnerability affects PHP-based installations with accessible /admin/ directories.
Remediation
No patch information is available in the provided references. Given the 2015 disclosure date and apparent lack of vendor response, organizations should consider RealtyScript 4.0.2 as end-of-life. Recommended mitigations include: 1) Migrate to a supported real estate management system, 2) If migration is not immediately possible, implement web application firewall rules to filter SQL injection attempts, 3) Restrict access to /admin/ directories through IP whitelisting or additional authentication layers, 4) Apply input validation and parameterized queries if source code modification is possible.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2015-9423