sBLOG <= 0.7.2 search.php keyword Parameter SQL Injection

Critical Nessus Network Monitor Plugin ID 3528

Synopsis

The remote web server contains a PHP script that is prone to SQL injection attacks.

Description

The remote web server contains a PHP script that is prone to SQL injection attacks. The remote host is running sBLOG, a PHP-based blog application. The installed version of sBLOG fails to validate user input to the 'keyword' parameter of the 'search.php' script before using it to generate database queries. Regardless of PHP's 'magic_quotes_gpc' setting, an unauthenticated attacker can leverage this issue to manipulate database queries to bypass authentication, disclose sensitive information, modify data, or launch attacks against the underlying database.

Solution

No solution is known at this time.

See Also

http://www.securityfocus.com/archive/1/432724/30/0/threaded

http://servous.se

Plugin Details

Severity: Critical

ID: 3528

Family: CGI

Published: 2004/08/18

Modified: 2018/07/11

Dependencies: 1442

Nessus ID: 21313

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:servous:sblog

Reference Information

CVE: CVE-2006-2189

BID: 17782