h=Message-ID:Received:Date:From:To:MIME-Version:Content-Type:Content-Transfer-Encoding;
Date: Sat, 4 Feb 2006 02:03:26 -0800 (PST)
From: h e <het_ebadi@yahoo.com.>
Subject: PluggedOut Blog SQL injection and XSS
To: "[email protected]" <bugs@securitytracker.com.>,
"[email protected]" <bugtraq@securityfocus.com.>,
"[email protected]" <content-editor@securityfocus.com.>,
"[email protected]" <editor@securityfocus.com.>,
"[email protected]" <expert@securiteam.com.>,
"[email protected]" <news-editor@securityfocus.com.>,
"[email protected]" <support@secunia.com.>,
"[email protected]" <vuldb@securityfocus.com.>,
"[email protected]" <vuln@secunia.com.>,
"[email protected]" <webmaster@secunia.com.>,
"[email protected]" <webmaster@securityfocus.com.>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Virus-Scanned: antivirus-gw at tyumen.ru
PluggedOut Blog SQL INJECTION and XSS
PluggedOut Blog is an open source script you can run
on your web server to give you an online multi-user
journal or diary.
It can be used equally well for any kind of calendar
application.Rather than give you a thousand things you
don't really want ...
PluggedOut Blog : http://www.pluggedout.com/
Credit:
The information has been provided by Hamid Ebadi
(Hamid Network Security Team):[email protected]
The original article can be found at:
http://hamid.ir/security/
Vulnerable Systems:
PluggedOut Blog Version : Version: 1.9.9c
(2006-01-13)
example :
The following URL can be used to trigger an SQL
injection vulnerability in the exec.php :
http://[PluggedOut
Blog]/exec.php?action=comment_add&entryid=[SQL
INJECTION]
and XSS
http://[PluggedOut
Blog]/problem.php?id=1&data=<script>alert('Hamid
Network Security Team -->
http://hamid.ir');alert(document.cookie)</script>
Signature
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com