{"id": "PACKETSTORM:108974", "type": "packetstorm", "bulletinFamily": "exploit", "title": "Bart's CMS SQL Injection", "description": "", "published": "2012-01-23T00:00:00", "modified": "2012-01-23T00:00:00", "cvss": {"vector": "NONE", "score": 0.0}, "href": "https://packetstormsecurity.com/files/108974/Barts-CMS-SQL-Injection.html", "reporter": "snup", "references": [], "cvelist": [], "lastseen": "2016-11-03T10:16:11", "viewCount": 4, "enchantments": {"score": {"value": 0.1, "vector": "NONE", "modified": "2016-11-03T10:16:11", "rev": 2}, "dependencies": {"references": [], "modified": "2016-11-03T10:16:11", "rev": 2}, "vulnersScore": 0.1}, "sourceHref": "https://packetstormsecurity.com/files/download/108974/VL-390.txt", "sourceData": "`Title: \n====== \nBart`s CMS - SQL Injection Vulnerability \n \n \nDate: \n===== \n2012-01-23 \n \n \nReferences: \n=========== \nhttp://www.vulnerability-lab.com/get_content.php?id=390 \n \n \nVL-ID: \n===== \n390 \n \n \nIntroduction: \n============= \nIt is a website Content Management System that is build with Codecharge Studio. There will also be a \ncommercial package, which contains all source code AND the Codecharge Studio project files. \nMore information on Codecharge Studio can be found on the website of Yessoftware. \n \nCurrently the CMS includes the following modules: \n \nDefault / CMS \nUsers \nWebsite pages \nBlocks \nBanners \nLinks \nImage gallery \nStore / Webshop \nDiagrams \nDownload manager \nIP To Country \nMailing \nPolls \nCalendar / Events \nBlog / News \nGuestbook \nJW Flash Image Rotator \n \n(Copy of the Vendor Website: http://www.yessoftware.com/index2.php ) \n(Copy: http://trinityhome.org/Home/index.php?content=BART_S_CMS_WHAT_IS_IT&front_id=21&lang=en&locale=en) \n \n \nAbstract: \n========= \nA Vulnerability Laboratory researcher discovered a critical (remote) SQL Injection Vulnerability on Bart`s CMS. \n \n \n \nReport-Timeline: \n================ \n2012-01-23: Public or Non-Public Disclosure \n \n \nStatus: \n======== \nPublished \n \n \nExploitation-Technique: \n======================= \nRemote \n \n \nSeverity: \n========= \nHigh \n \n \nDetails: \n======== \nA remote SQL Injection Vulnerability has been discovered on the Bart`s CMS application. \nThe vulnerability allows an attacker to execute own sql commands via injection. The bug is \nlocated on the following files blog.php & blog_comments.php. Successful exploitation can \nresult in cms dbms comprimise via remote sql injection. \n \nVulnerable Module(s): \n[+] blog.php \n[+] blog_comments.php \n \n \nProof of Concept: \n================= \nThe vulnerability can be exploited by remote attacker without user inter action. \nFor demonstration or reproduce ... \n \nPoC: \n[SERVER].COM/[BART CMS PATH]/blog_comments.php?blog_id=`[SQL-Injection] \n \n \nRisk: \n===== \nThe security risk of the remote sql injection vulnerability is estimated as high(+). \n \n \nCredits: \n======== \nVulnerability Laboratory Researcher - snup (snup.php@gmail.com) \n \n= Gr33tz: = \n= agilob, cOnd, czoik, drummachina, gocys, prick \n= im2ee, MadCow, n1k0n3r, R3w, rtgn, SiD, vizzdoom \n= antonius, Rem0ve, longrifle0x \n \n \nDisclaimer: \n=========== \nThe information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, \neither expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- \nLab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business \nprofits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some \nstates do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation \nmay not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- \nLab. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of \nother media, are reserved by Vulnerability-Lab or its suppliers. \n \nCopyright \u00a9 2012|Vulnerability-Lab \n \n-- \nWebsite: www.vulnerability-lab.com ; vuln-lab.com or vuln-db.com \nContact: admin@vulnerability-lab.com or support@vulnerability-lab.com \n \n`\n"}