vendor:
Battle Blog
by:
Bl@ckbe@rD ('Tunisian TerrorisT')
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Battle Blog
Affected Version From: 1.25
Affected Version To: 1.25
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
Battle Blog <= V 1.25
The Battle Blog script is vulnerable to SQL injection. Attackers can exploit this vulnerability by sending malicious SQL queries to the vulnerable parameter 'entry' in the 'comment.asp' page. For MS SQL Server, the payload 22+and+1=convert(int,(select+@@version))-- can be used. For Ms ACCESS, the payload IIF((select%20mid(last(Name),1,1)%20from%20(select%20top%2010%20Namee%20from%20MSysObjects))='a',0,'done')%00 can be used.
Mitigation:
Input validation should be used to prevent SQL injection attacks.