header-logo
Suggest Exploit
vendor:
Loudblog
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection, Local File Inclusion, Information Disclosure
89, 94, 200
CWE
Product Name: Loudblog
Affected Version From: 0.41
Affected Version To: 0.41
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

Loudblog Multiple Input Validation Vulnerabilities

Loudblog is prone to multiple input-validation vulnerabilities, including an SQL-injection vulnerability, two local file-include vulnerabilities, and an information-disclosure vulnerability. These issues allow remote attackers to execute arbitrary PHP script code in the context of the hosting webserver, gain administrative privileges in the web application, and gain access to potentially sensitive information. The SQL-injection vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

Mitigation:

Users should upgrade to the latest version of Loudblog. Additionally, users should ensure that input is properly sanitized and validated before being passed to the application.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/17023/info
  
Loudblog is prone to multiple input-validation vulnerabilities:
  
- An SQL-injection vulnerability.
- Two local file-include vulnerabilities.
- An information-disclosure vulnerability.
  
These issues allow remote attackers to execute arbitrary PHP script code in the context of the hosting webserver, gain administrative privileges in the web application, and gain access to potentially sensitive information.
  
The SQL-injection vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
  
Other attacks may also be possible.
  
Loudblog version 0.41 is vulnerable to these issues; other versions may also be affected.

POST /loudblog/loudblog/inc/backend_settings.php HTTP/1.1
Host: www.example.com
Content-Type: application/x-www-form-urlencoded
Content-Length: 23

language=../../../index