vendor:
LoudBlog
by:
Xianur0
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: LoudBlog
Affected Version From: All Versions
Affected Version To: All Versions
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2008
LoudBlog Exploit All Version By Xianur0
This Exploit requires a valid user name and password of an account regardless of the permissions. It uses HTTP::Request::Common qw(POST) and LWP::UserAgent to send a POST request to the LoudBlog ajax.php page with the colpick, rowpick, rowval, and table parameters set. The User-Agent and Cookie headers are also set with the valid user's MD5 hash. The response contains the username and password of the admin account.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in SQL queries.