Multiple Vulnerabilities in LoudBlog

2011-05-17T00:00:00
ID HTB23002
Type htbridge
Reporter High-Tech Bridge
Modified 2011-05-17T00:00:00

Description

High-Tech Bridge SA Security Research Lab has discovered multiple vulnerabilities in LoudBlog which could be exploited to perform cross-site scripting and SQL injection attacks.

1) Cross-site scripting (XSS) vulnerability in LoudBlog
The vulnerability exists due to input sanitation error in the "id" parameter in loudblog/index.php when "page" is set to "comments" or "record2". A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary HTML and script code in user`s browser in context of the vulnerable website.
Exploitation examples:
http://[host]/loudblog/index.php?page=comments&do=x&id=%3Cscript%3Ealert%281 23%29;%3C/script%3E
http://[host]/loudblog/index.php?page=record2&do=edit&i d=%3Cscript%3Ealert%28123%29;%3C/script%3E

2) SQL injection vulnerabilities in LoudBlog
2.1 The vulnerability exists due to input sanitation errors in the "test" parameter in loudblog/ajax.php. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in applications database. Successful exploitation may allow an attacker to read, modify, add or delete arbitrary data in the database. Exploitation example: http://[host]/loudblog/ajax.php?test=%27%20union%20select%20version%28%29%20 --%201 2.2 The vulnerability exists due to input sanitation errors in the "id" parameter in loudblog/index.php. A remote attacker can send a specially crafted HTTP request to the vulnerable script and execute arbitrary SQL commands in applications database. Successful exploitation may allow an attacker to read, modify, add or delete arbitrary data in the database.
Exploitation example:
http://[host]/loudblog/index.php?page=record2&do=edit&id=%27%20union%20selec t%201,2,3,4,version%28%2 9,6%20--%202