vendor:
Aperto Blog
by:
NoGe
7.5
CVSS
HIGH
Local File Inclusion and SQL Injection
94, 98
CWE
Product Name: Aperto Blog
Affected Version From: 2000.1.1
Affected Version To: 2000.1.1
Patch Exists: NO
Related CWE: N/A
CPE: a:apertoblog:apertoblog:0.1.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
Aperto Blog 0.1.1 Local File Inclusion and SQL Injection Vulnerabilities
Aperto Blog version 0.1.1 is vulnerable to Local File Inclusion and SQL Injection. The vulnerable files are admin.php, index.php and categories.php. An attacker can exploit these vulnerabilities by sending malicious requests to the vulnerable files. For example, an attacker can send a malicious request to admin.php?action=[LFI] to exploit the Local File Inclusion vulnerability. Similarly, an attacker can send a malicious request to categories.php?id=[SQL] to exploit the SQL Injection vulnerability.
Mitigation:
The application should validate user input and filter out any malicious code. The application should also use parameterized queries to prevent SQL Injection attacks.