eggblog search.php q Variable Path Disclosure

2005-12-22T09:32:53
ID OSVDB:21909
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2005-12-22T09:32:53

Description

Vulnerability Description

eggblog contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker supplies an invalid 'q' variable in search.php script, which will disclose the software's installation path resulting in a loss of confidentiality. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

Technical Description

It is very likely the path disclosure is the result of a failed SQL query, that has been mistaken for a potential SQL injection attack.

Solution Description

Upgrade to version v3.0b or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

eggblog contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker supplies an invalid 'q' variable in search.php script, which will disclose the software's installation path resulting in a loss of confidentiality. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.

References:

Vendor URL: http://www.epicdesigns.co.uk/projects/eggblog.php Secunia Advisory ID:18212 Related OSVDB ID: 21908 Other Advisory URL: http://pridels.blogspot.com/2005/12/eggblog-vuln.html CVE-2005-4546