SQL Injection Vulnerability in geoBlog
Summary
- Vulnerability
 - SQL Injection Vulnerability in geoBlog
 - Discovered
 - 2006.01.14
 - Last Update
 - 0 n/a
 - ID
 - EV0033
 - CVE
 - CVE-2006-0249
 - Risk Level
 - high
 - Type
 - SQL Injection
 - Status
 - Unpatched
 - Vendor
 - n/a
 - Vulnerable Software
 - geoBlog (http://sourceforge.net/projects/bitdamaged/)
 - Version
 - MOD_1.0
 - PoC/Exploit
 - Available
 - Solution
 - Not available
 - Discovered by
 - Aliaksandr Hartsuyeu (eVuln.com)
 
Description
SQL Injection found in geoBlog (http://sourceforge.net/projects/bitdamaged/) script.
Vulnerable script:
 viewcat.php
Variable $tmpCategory isn't properly sanitized before being used in a SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.
Condition: magic_quotes_gpc - off
Administrator's login name and password's hash storing in database.
Administrator has an ability to upload arbitrary files which will be stored in /files directory.
System access is possible.
PoC/Exploit
SQL Injection Example:
http://host/geoblog/viewcat.php?cat=I'%20union%20select%201,2,3,4,5,6,7/*
Solution.
Solution for "SQL Injection Vulnerability in geoBlog" is not available. Check vendor's website for updates.
