Multiple SQL injection vulnerabilities in Blogs Manager 1.101 and earlier allow remote attackers to execute arbitrary SQL commands via the SearchField parameter in a search action to (1) _authors_list.php, (2) _blogs_list.php, (3) _category_list.php, (4) _comments_list.php, (5) _policy_list.php, (6) _rate_list.php, (7) categoriesblogs_list.php, (8) chosen_authors_list.php, (9) chosen_blogs_list.php, (10) chosen_comments_list.php, and (11) help_list.php in blogs/.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0303.html | exploit mailing list |
http://osvdb.org/77255 | vdb entry |
http://osvdb.org/77256 | vdb entry |
http://osvdb.org/77259 | vdb entry |
http://osvdb.org/77251 | vdb entry |
http://osvdb.org/77257 | vdb entry |
http://osvdb.org/77258 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71401 | vdb entry |
http://www.exploit-db.com/exploits/18129 | exploit |
http://sourceforge.net/tracker/?func=detail&aid=3506818&group_id=219284&atid=1045881 | exploit |
http://osvdb.org/77252 | vdb entry |
http://osvdb.org/77260 | vdb entry |
http://osvdb.org/77254 | vdb entry |
http://www.securityfocus.com/archive/1/520571/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/50731 | vdb entry exploit |
http://osvdb.org/77250 | vdb entry |
http://osvdb.org/77253 | vdb entry |
http://secunia.com/advisories/46918 | third party advisory vendor advisory |