Simplog archive.php Multiple Variable SQL Injection

2006-04-11T06:32:38
ID OSVDB:24561
Type osvdb
Reporter rgod(retrogod@aliceposta.it)
Modified 2006-04-11T06:32:38

Description

Vulnerability Description

Simplog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the archive.php script not properly sanitizing user-supplied input to the 'blogid', 'm' or 'y' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Upgrade to version 0.9.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Simplog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the archive.php script not properly sanitizing user-supplied input to the 'blogid', 'm' or 'y' variables. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/[path]/archive.php?blogid=[sql] http://[target]/[path]/archive.php?m=[sql] http://[target]/[path]/archive.php?y=[sql]

References:

Vendor URL: http://www.simplog.org/ Vendor Specific Solution URL: http://www.simplog.org/archive.php?blogid=1&pid=56 Secunia Advisory ID:19628 Related OSVDB ID: 24559 Related OSVDB ID: 24560 Related OSVDB ID: 24562 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-04/0232.html Generic Exploit URL: http://milw0rm.com/exploits/1663 FrSIRT Advisory: ADV-2006-1332 CVE-2006-1778 Bugtraq ID: 17491