|
Family: CGI abuses --> Category: attack
sBLOG keyword Parameter SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for keyword parameter SQL injection in sBLOG
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is prone to SQL
injection attacks.
Description :
The remote host is running sBLOG, a PHP-based blog application.
The installed version of sBLOG fails to validate user input to the
'keyword' parameter of the 'search.php' script before using it to
generate database queries. Regardless of PHP's 'magic_quotes_gpc'
setting, an unauthenticated attacker can leverage this issue to
manipulate database queries to, for instance, bypass authentication,
disclose sensitive information, modify data, or launch attacks against
the underlying database.
See also :
http://www.securityfocus.com/archive/1/432724/30/0/threaded
Solution :
Unknown at this time.
Threat Level:
Critical / CVSS Base Score : 10.0
(AV:R/AC:L/Au:NR/C:C/I:C/A:C/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|