aoblogger login.php username Field SQL Injection

2006-01-16T04:18:26
ID OSVDB:22527
Type osvdb
Reporter Aliaksandr Hartsuyeu(alex@evuln.com)
Modified 2006-01-16T04:18:26

Description

Vulnerability Description

aoblogger contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'login.php' script not properly sanitizing user-supplied input to the 'username' field. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This vulnerability is only present when the magic_quotes_gpc PHP option is 'off'.

Solution Description

Upgrade to version 2.4 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

aoblogger contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'login.php' script not properly sanitizing user-supplied input to the 'username' field. This may allow an attacker to inject or manipulate SQL queries in the backend database.

References:

Vendor URL: http://mikeheltonisawesome.com/ Secunia Advisory ID:16889 Related OSVDB ID: 22526 Related OSVDB ID: 22528 Other Advisory URL: http://evuln.com/vulns/37/summary.html Mail List Post: http://attrition.org/pipermail/vim/2006-April/000700.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-01/0322.html Keyword: EV0037 FrSIRT Advisory: ADV-2006-0240 CVE-2006-0311 Bugtraq ID: 16286