SQL Injection Vulnerability in geoBlog
Summary
- Vulnerability
- SQL Injection Vulnerability in geoBlog
- Discovered
- 2006.01.14
- Last Update
- 0 n/a
- ID
- EV0033
- CVE
- CVE-2006-0249
- Risk Level
- high
- Type
- SQL Injection
- Status
- Unpatched
- Vendor
- n/a
- Vulnerable Software
- geoBlog (http://sourceforge.net/projects/bitdamaged/)
- Version
- MOD_1.0
- PoC/Exploit
- Available
- Solution
- Not available
- Discovered by
- Aliaksandr Hartsuyeu (eVuln.com)
Description
SQL Injection found in geoBlog (http://sourceforge.net/projects/bitdamaged/) script.
Vulnerable script:
viewcat.php
Variable $tmpCategory isn't properly sanitized before being used in a SQL query. This can be used to make any SQL query by injecting arbitrary SQL code.
Condition: magic_quotes_gpc - off
Administrator's login name and password's hash storing in database.
Administrator has an ability to upload arbitrary files which will be stored in /files directory.
System access is possible.
PoC/Exploit
SQL Injection Example:
http://host/geoblog/viewcat.php?cat=I'%20union%20select%201,2,3,4,5,6,7/*
Solution.
Solution for "SQL Injection Vulnerability in geoBlog" is not available. Check vendor's website for updates.