OSEC

Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email hr@neohapsis.com
 
[eVuln] SaralBlog XSS & Multiple SQL Injection Vulnerabilities

alexevuln.com
Date: Wed Jan 18 2006 - 14:01:56 CST


New eVuln Advisory:
SaralBlog XSS & Multiple SQL Injection Vulnerabilities
http://evuln.com/vulns/40/summary/bt/

--------------------Summary----------------

Software: SaralBlog
Sowtware's Web Site: http://www.saralblog.org/
Versions: 1.0
Critical Level: Moderate
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)
eVuln ID: EV0040

-----------------Description---------------
1. Most of user defined data isn't properly sanitized. This can be used to make any SQL query by injecting arbitrary SQL code.

2. Cross-Site Scripting is possible.

Vulnerable script: view.php
Variable $website isn't properly sanitized. This can be used to insert arbitrary javascript code.

--------------Exploit----------------------
Available at: http://evuln.com/vulns/40/exploit/bt/

--------------Solution---------------------
No Patch available.

--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)