by r0t,der4444,cembo,VietMafia

Monday, December 05, 2005

saralblog v1 SQL inj. vuln.

saralblog v1 SQL inj. vuln.
Vuln. dicovered by : r0t
Date: 6 dec. 2005
vendor:http://www.saralblog.org/
affected version:v.1 and prior

Product Description:
saralblog is a very simple to use blog, which has some very innovative feautures. It uses dynamic tags instead of categories which makes posting a lot quicker and easier. It also has RSS, multi-user support and moderation.

Vuln. Description:
Input passed to the "id" parameter in "viewprofile.php" isn't properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

example:
/viewprofile.php?id=[SQL]

Solution:
Edit the source code to ensure that input is properly sanitised.

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew