vendor:
Blaze Apps
by:
AmnPardaz Security Research Team
7,5
CVSS
HIGH
MS SQL Server 2005 SQL Injection, Stored XSS Vulnerability
89, 79
CWE
Product Name: Blaze Apps
Affected Version From: 1.4.0.051909
Affected Version To: 1.4.0.051909
Patch Exists: NO
Related CWE: N/A
CPE: 2.3:a:blazeapps:blazeapps:1.4.0.051909
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: ASP .NET 2
2009
Blaze Apps Multiple Vulnerabilities
There is an SQL Injection vulenarability in the site search module. Submitting search criteria will cause subroutine 'uxSubmitButton_Click' in the file '<SRC_DIR>/BlazeApps/Usercontrols/Search.ascx.vb' to be executed. Then it will use 'uxSearchTextBox' input element value (POST Variable) and the 'tagname' input value (POST Variable) without escaping, in a query. The post page of the site's forum save posts without any check on the input. In file '<SRC_DIR>/BlazeApps/Usercontrols/Forum/addpost.ascx.vb' line 121 the 'uxAddPostTexBox' input element value (POST Variable) is used without any check.
Mitigation:
N/A