SimpleBlog default.asp id Variable SQL Injection

2006-09-04T05:04:02
ID OSVDB:28541
Type osvdb
Reporter MurderSkillz(), vipsta(vipsta@gmail.com)
Modified 2006-09-04T05:04:02

Description

Vulnerability Description

SimpleBlog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the default.asp script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

SimpleBlog contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the default.asp script not properly sanitizing user-supplied input to the 'id' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/[path]/default.asp?view=plink&id=-1%20UNION%20SELECT%20ID,uFULLNAME,uUSERNAME,uPASSWORD,uEMAIL,uDATECREATED,null,null,null%20FROM%20T_USERS%20WHERE%20id>1

References:

Vendor URL: http://plone.org/products/simpleblog Secunia Advisory ID:21755 Generic Exploit URL: http://milw0rm.com/exploits/2296 FrSIRT Advisory: ADV-2006-3451 CVE-2006-4592 Bugtraq ID: 19848