ID OSVDB:15756 Type osvdb Reporter security curmudgeon(jericho@attrition.org) Modified 2005-04-24T04:50:00
Description
Vulnerability Description
bBlog contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'postid' variable in the index.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.
Solution Description
Upgrade to version 0.7.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
Short Description
bBlog contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'postid' variable in the index.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.
Manual Testing Notes
http://[victim]/[blogpath]/?postid=1%20or%201=1
References:
Vendor URL: http://www.bblog.com/
Vendor Specific News/Changelog Entry: http://www.bblog.com/wiki/index.php/Change_Log
Vendor Specific News/Changelog Entry: http://sourceforge.net/tracker/index.php?func=detail&aid=1188735&group_id=81992&atid=564683
Vendor Specific News/Changelog Entry: http://bblog.com/bugs/index.php?do=details&id=67
Security Tracker: 1013811
Related OSVDB ID: 15755Related OSVDB ID: 15754CVE-2005-1310
{"edition": 1, "title": "bBlog index.php postid Variable SQL Injection", "bulletinFamily": "software", "published": "2005-04-24T04:50:00", "lastseen": "2017-04-28T13:20:11", "modified": "2005-04-24T04:50:00", "reporter": "security curmudgeon(jericho@attrition.org)", "viewCount": 1, "href": "https://vulners.com/osvdb/OSVDB:15756", "description": "## Vulnerability Description\nbBlog contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'postid' variable in the index.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.\n## Solution Description\nUpgrade to version 0.7.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nbBlog contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'postid' variable in the index.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.\n## Manual Testing Notes\nhttp://[victim]/[blogpath]/?postid=1%20or%201=1\n## References:\nVendor URL: http://www.bblog.com/\nVendor Specific News/Changelog Entry: http://www.bblog.com/wiki/index.php/Change_Log\nVendor Specific News/Changelog Entry: http://sourceforge.net/tracker/index.php?func=detail&aid=1188735&group_id=81992&atid=564683\nVendor Specific News/Changelog Entry: http://bblog.com/bugs/index.php?do=details&id=67\nSecurity Tracker: 1013811\n[Related OSVDB ID: 15755](https://vulners.com/osvdb/OSVDB:15755)\n[Related OSVDB ID: 15754](https://vulners.com/osvdb/OSVDB:15754)\n[CVE-2005-1310](https://vulners.com/cve/CVE-2005-1310)\n", "affectedSoftware": [{"name": "BBLog", "version": "0.7.4", "operator": "eq"}, {"name": "BBLog", "version": "0.7.5", "operator": "eq"}], "type": "osvdb", "references": [], "enchantments": {"score": {"value": 6.9, "vector": "NONE", "modified": "2017-04-28T13:20:11", "rev": 2}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-1310"]}, {"type": "nessus", "idList": ["BBLOG_0_7_4.NASL"]}], "modified": "2017-04-28T13:20:11", "rev": 2}, "vulnersScore": 6.9}, "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 7.5}, "cvelist": ["CVE-2005-1310"], "id": "OSVDB:15756", "immutableFields": []}