header-logo
Suggest Exploit
vendor:
saralblog
by:
SecurityFocus
7.5
CVSS
HIGH
Input Validation
89
CWE
Product Name: saralblog
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

saralblog Multiple Input Validation Vulnerabilities

saralblog is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials or possibly permit an attacker to control how the site is rendered to the user. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks. The following proof of concept URI for some of the SQL injection issues are available: http://www.example.com/viewprofile.php?id=999%20union%20select%201,2,3,4,5,6,7/* Also supplying the following to the search parameter: aaaaa') union select 1,2,3,4,5,6/*

Mitigation:

Input validation should be performed to ensure that untrusted data is not used to execute unintended commands or queries.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/16306/info

saralblog is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials or possibly permit an attacker to control how the site is rendered to the user. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks. 

The following proof of concept URI for some of the SQL injection issues are available:
http://www.example.com/viewprofile.php?id=999%20union%20select%201,2,3,4,5,6,7/*

Also supplying the following to the search parameter:
aaaaa') union select 1,2,3,4,5,6/*