LBlog comments.asp id Variable SQL Injection

2006-08-20T09:33:53
ID OSVDB:28036
Type osvdb
Reporter Chironex Fleckeri(ChironeX.FleckeriX@gmail.com)
Modified 2006-08-20T09:33:53

Description

Vulnerability Description

LBlog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'comments.asp' script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

LBlog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'comments.asp' script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/path/comments.asp?id=-1 UNION SELECT 0,username,password,3,4+FROM+LOGIN+WHERE+ID=1

References:

Vendor URL: http://www.lblog.dk/ Security Tracker: 1016721 Secunia Advisory ID:21596 Other Advisory URL: http://www.milw0rm.com/exploits/2230 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-08/0399.html ISS X-Force ID: 28472 CVE-2006-4284 Bugtraq ID: 19607