sBLOG <= 0.7.2 search.php keyword Parameter SQL Injection

critical Nessus Network Monitor Plugin ID 3528

Synopsis

The remote web server contains a PHP script that is prone to SQL injection attacks.

Description

The remote web server contains a PHP script that is prone to SQL injection attacks. The remote host is running sBLOG, a PHP-based blog application. The installed version of sBLOG fails to validate user input to the 'keyword' parameter of the 'search.php' script before using it to generate database queries. Regardless of PHP's 'magic_quotes_gpc' setting, an unauthenticated attacker can leverage this issue to manipulate database queries to bypass authentication, disclose sensitive information, modify data, or launch attacks against the underlying database.

Solution

No solution is known at this time.

See Also

http://www.securityfocus.com/archive/1/432724/30/0/threaded

http://servous.se

Plugin Details

Severity: Critical

ID: 3528

Family: CGI

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 21313

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:servous:sblog

Reference Information

CVE: CVE-2006-2189

BID: 17782