Particle Blogger 1.2.1 SQL Injection

Credit: ls calima
Risk: Medium
Local: No
Remote: Yes

CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Application: Particle Blogger Web Site: Versions: 1.2.1 and below Platform: linux, windows, freebsd, sun Bug: SQL Injection Severity: High (since there is no need to authenticate.) Fix Available: No ------------------------------------------------------- 1) Introduction 2) Bug 3) The Code 4) Fix 5) About Vigilon 6) Disclaimer =========== 1) Introduction =========== "Enter the world of blogging and setup a blog on your own website, installed within minutes using Particle Blogger's easy installer." ====== 2) Bug ====== SQL Injection =============== 3) Proof of concept. =============== The File archives.php is subject to several SQL Injections. example: http://site/apppath/archives.php?year=2007&month=' ===== 4) Fix ===== the authors email or contact details were not availble. Currently the Web is was not availble. ============ 5) About ============ - is a portal dedicated to web defacements, tracking defacements around the world. ========== 6) Disclaimer ========== The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021,


Back to Top