SQL Injection Vulnerability in geoBlog

Summary

Vulnerability
SQL Injection Vulnerability in geoBlog
Discovered
2006.01.14
Last Update
0 n/a
ID
EV0033
CVE
CVE-2006-0249
Risk Level
high
Type
SQL Injection
Status
Unpatched
Vendor
n/a
Vulnerable Software
geoBlog (http://sourceforge.net/projects/bitdamaged/)
Version
MOD_1.0
PoC/Exploit
Available
Solution
Not available
Discovered by
Aliaksandr Hartsuyeu (eVuln.com)

Description

SQL Injection found in geoBlog (http://sourceforge.net/projects/bitdamaged/) script.

Vulnerable script:
viewcat.php

Variable $tmpCategory isn't properly sanitized before being used in a SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.

Condition: magic_quotes_gpc - off

Administrator's login name and password's hash storing in database.
Administrator has an ability to upload arbitrary files which will be stored in /files directory.

System access is possible.

PoC/Exploit

SQL Injection Example:

http://host/geoblog/viewcat.php?cat=I'%20union%20select%201,2,3,4,5,6,7/*

Solution.

Solution for "SQL Injection Vulnerability in geoBlog" is not available. Check vendor's website for updates.