vendor:
JBLOG
by:
Ams
7,5
CVSS
HIGH
SQL-injection
89
CWE
Product Name: JBLOG
Affected Version From: 1.5.1
Affected Version To: 1.5.1
Patch Exists: NO
Related CWE: N/A
CPE: a:jblog:jblog:1.5.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
Unknown
JBLOG 1.5.1 SQL-injection exploit
Both 'index.php' and 'admin.php' includes file 'common.php' which checks for user permission on line 81 via function 'check_user()'. This function is defined in file 'include/func_user.php'. There is another one function - 'get_cookie()' which gets cookie values. So, in cookies we put our evil string and further actions should be clear. This exploit uses SQL-injection to create dump of users table. Actually, we are possible to do all administrator actions.
Mitigation:
Filter COOKIEs and use secure authentication methods.