Super Simple Blog Script entry Parameter SQL Injection

high Nessus Plugin ID 50048

Synopsis

A PHP application hosted on the remote web server is affected by a SQL injection vulnerability.

Description

The remote Super Simple Blog Script install hosted on the remote web server is affected by a SQL injection vulnerability because its 'comments.php' script does not properly sanitize input to the 'entry' parameter before using it a database query.

Regardless of PHP's 'magic_quotes_gpc' setting, an unauthenticated remote attacker can leverage this issue to manipulate database queries, leading to disclosure of sensitive information, attacks against the underlying database, and the like.

Note that the application may also be affected by a related local file inclusion vulnerability, although Nessus has not checked for that.

Solution

Upgrade to Super Simple Blog Script 2.56 or later.

Plugin Details

Severity: High

ID: 50048

File Name: super_simple_blog_entry_parameter_sqli.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 10/20/2010

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/super_simple_blog

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 8/6/2009

Vulnerability Publication Date: 7/17/2009

Reference Information

CVE: CVE-2009-2553

BID: 43524

CWE: 89