header-logo
Suggest Exploit
vendor:
EasyMoblog
by:
Unknown
N/A
CVSS
N/A
Input-Validation
Unknown
CWE
Product Name: EasyMoblog
Affected Version From: 2000.5.1
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE:
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

Input-Validation Vulnerabilities in EasyMoblog

EasyMoblog is prone to multiple input-validation vulnerabilities, including SQL-injection issues and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied input. Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerability in the underlying database implementation.

Mitigation:

Unknown
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22369/info

EasyMoblog is prone to multiple input-validation vulnerabilities, including SQL-injection issues and a cross-site scripting issue, because the application fails to sufficiently sanitize user-supplied input.

Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, retrieve sensitive information, access or modify data, or exploit latent vulnerability in the underlying database implementation.

EasyMoblog version 0.5.1 is vulnerable; other versions may also be affected. 

To exploit an SQL-injection issue:

An attacker can exploit this issue via a web client.

The following proof-of-concept URIs are available:

http://www.example.com/easymoblog/add_comment.php?i='[SQL]
http://www.example.com/easymoblog/img.php?i='[XSS]