Synopsis
A PHP application hosted on the remote web server is affected by a SQL injection vulnerability.
Description
The remote Super Simple Blog Script install hosted on the remote web server is affected by a SQL injection vulnerability because its 'comments.php' script does not properly sanitize input to the 'entry' parameter before using it a database query.
Regardless of PHP's 'magic_quotes_gpc' setting, an unauthenticated remote attacker can leverage this issue to manipulate database queries, leading to disclosure of sensitive information, attacks against the underlying database, and the like.
Note that the application may also be affected by a related local file inclusion vulnerability, although Nessus has not checked for that.
Solution
Upgrade to Super Simple Blog Script 2.56 or later.
Plugin Details
File Name: super_simple_blog_entry_parameter_sqli.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Vulnerability Information
Required KB Items: www/super_simple_blog
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Patch Publication Date: 8/6/2009
Vulnerability Publication Date: 7/17/2009