MyBloggie 2.1.6 SQL Injection

Credit: calima
Risk: High
Local: No
Remote: Yes

CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Application: MyBloggie 2.1.6 Web Site: Versions: 2.1.6 and below Platform: linux, windows, freebsd, sun Bug: SQL Injection Severity: High Fix Available: No ------------------------------------------------------- 1) Introduction 2) Bug 3) The Code 4) Fix 5) About Vigilon 6) Disclaimer =========== 1) Introduction =========== "myBloggie is considered one of the most simple, user-friendliest yet packed with features Weblog system available to date." ====== 2) Bug ====== SQL Injection =============== 3) Proof of concept. =============== The File index.php is subject to several SQL Injections. example: http://server/apppath/index.php?mode=viewuser&cat_id=' http://server/apppath/index.php?mode=viewuser&month_no=4&year=" ===== 4) Fix ===== The Author Did not responded to Email sent about this issue, ============ 5) About ============ - is a portal dedicated to web defacements, tracking defacements around the world. ========== 6) Disclaimer ========== The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top