vendor:
macgurublog_menu
by:
Virangar Security Team
9
CVSS
HIGH
Blind SQL Injection
89
CWE
Product Name: macgurublog_menu
Affected Version From: 2.2
Affected Version To: 2.2
Patch Exists: NO
Related CWE: N/A
CPE: e107:macgurublog_menu:2.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008
e107 Plugin BLOG Engine v2.2 (macgurublog.php/uid) Blind SQL Injection Vulnerability
The vulnerability exists in the macgurublog.php file, where the user_id parameter is not properly sanitized before being used in a SQL query. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious SQL statements to the vulnerable application. This can allow an attacker to gain access to sensitive information from the database, such as user credentials.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to construct SQL queries in an unsafe manner. Additionally, parameterized queries should be used to prevent SQL injection attacks.