bBlog rss.php p Parameter SQL Injection

high Nessus Plugin ID 15466

Synopsis

The remote web application is vulnerable to a SQL injection attack.

Description

The remote server runs a version of bBlog, a blogging system written in PHP and released under the GPL, which is as old as or older than version 0.7.4.

The remote version of this software is affected by a SQL injection attack in the script 'rss.php'. This issue is due to a failure of the application to properly sanitize user-supplied input.

An attacker may use this flaw to execute arbitrary PHP code on this host or to take the control of the remote database.

Solution

Upgrade to version 0.7.4 or later.

Plugin Details

Severity: High

ID: 15466

File Name: bblog_sql_inject.nasl

Version: 1.19

Type: remote

Family: CGI abuses

Published: 10/13/2004

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:eaden_mckee:bblog

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 10/1/2004

Reference Information

CVE: CVE-2004-1570

BID: 11303