vendor:
RitsBlog
by:
Salvatore "drosophila" Fresta
8.8
CVSS
HIGH
SQL Injection and XSS Persistent
89, 79
CWE
Product Name: RitsBlog
Affected Version From: 2000.4.2
Affected Version To: 2000.4.2
Patch Exists: YES
Related CWE: N/A
CPE: a:ritsblog:ritsblog:0.4.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
RitsBlog 0.4.2 SQL Injection and XSS Persistent Vulnerabilities
RitsBlog 0.4.2 is vulnerable to SQL Injection and XSS Persistent. The SQL Injection vulnerability is present in the ritsBlogAdmin.class.php file, where the login function does not properly sanitize user-supplied input. An attacker can exploit this vulnerability by sending a crafted request with malicious SQL code. The XSS Persistent vulnerability is present in the ritsBlogAdmin.class.php file, where the addComment function does not properly sanitize user-supplied input. An attacker can exploit this vulnerability by sending a crafted request with malicious JavaScript code.
Mitigation:
It is possible to fix the SQL Injection vulnerability by adding the following line of code in ritsBlogAdmin.class.php: $password = mysql_real_escape_string($password). It is possible to fix the XSS Persistent vulnerability by adding the following line of code in ritsBlogAdmin.class.php: $name = htmlspecialchars($name); $body = htmlspecialchars($body).