PluggedOut Blog index.php Multiple Variable SQL Injection

2005-12-05T16:03:01
ID OSVDB:21480
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2005-12-05T16:03:01

Description

Vulnerability Description

Blog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'categoryid', 'entryid', 'year', 'month' and 'day' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Blog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'categoryid', 'entryid', 'year', 'month' and 'day' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

/index.php?categoryid=[SQL] /index.php?entryid=[SQL] /index.php?month=1&year=[SQL] /index.php?month=[SQL] /index.php?year=2005&month=12&day=[SQL]

References:

Vendor URL: http://www.pluggedout.com/index.php?pk=dev_blog Secunia Advisory ID:17911 Other Advisory URL: http://pridels.blogspot.com/2005/12/pluggedout-blog-sql-vuln.html FrSIRT Advisory: ADV-2005-2750 CVE-2005-4054 Bugtraq ID: 15746