microBlog index.php Multiple Variable SQL Injection

2006-01-16T04:02:39
ID OSVDB:22512
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-01-16T04:02:39

Description

Vulnerability Description

microBlog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'month' and 'year' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

microBlog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'month' and 'year' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/microblog/index.php?month=1&year=9999%20union%20select%201,2,3,4,5,6,7,8,9,10,11,12,13,14/*

References:

Vendor URL: http://www.stamcar.com/projekti/microblog/ Security Tracker: 1015496 Secunia Advisory ID:18442 Other Advisory URL: http://evuln.com/vulns/35/summary.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-01/0294.html Keyword: EV0035 FrSIRT Advisory: ADV-2006-0239 CVE-2006-0234 Bugtraq ID: 16270