vendor:
by:
S4mi
N/A
CVSS
N/A
Remote SQL injection Exploit
CWE
Product Name:
Affected Version From: 1
Affected Version To: 1
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested:
JBlog ver 1.0
The JBlog ver 1.0 script is vulnerable to remote SQL injection. An attacker can use the 'id' parameter in the index.php and modifpost.php files to inject SQL queries, allowing them to retrieve sensitive information from the database. The exploit sends a GET request with a specially crafted 'id' parameter to retrieve the login and password of the admin user from the 'auteur' table. The password is hashed with the MD5 algorithm.
Mitigation:
To mitigate this vulnerability, it is recommended to sanitize user input and use prepared statements or parameterized queries to prevent SQL injection attacks. Additionally, using strong and unique passwords, as well as implementing proper access controls, can help protect against unauthorized access.