Multiple SQL injection vulnerabilities in myBloggie 2.1.1 allow remote attackers to execute arbitrary SQL commands via (1) the keyword parameter in search.php; or (2) the date_no parameter in viewdate mode, (3) the cat_id parameter in viewcat mode, the (4) month_no or (5) year parameter in viewmonth mode, or (6) post_id parameter in viewid mode to index.php. NOTE: item (1) was discovered to affect 2.1.3 as well.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://mywebland.com/forums/viewtopic.php?t=180 | exploit |
http://marc.info/?l=bugtraq&m=111531904608224&w=2 | mailing list |
http://marc.info/?l=bugtraq&m=111722848308367&w=2 | mailing list |
http://secunia.com/advisories/14980 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/13507 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20439 | vdb entry |
http://www.securityfocus.com/bid/15017 | vdb entry |