Family: CGI abuses --> Category: attack
sBLOG keyword Parameter SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for keyword parameter SQL injection in sBLOG
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP script that is prone to SQL
The remote host is running sBLOG, a PHP-based blog application.
The installed version of sBLOG fails to validate user input to the
'keyword' parameter of the 'search.php' script before using it to
generate database queries. Regardless of PHP's 'magic_quotes_gpc'
setting, an unauthenticated attacker can leverage this issue to
manipulate database queries to, for instance, bypass authentication,
disclose sensitive information, modify data, or launch attacks against
the underlying database.
See also :
Unknown at this time.
Critical / CVSS Base Score : 10.0
Click HERE for more information and discussions on this network vulnerability scan.