From: "Omid" <omid@hackers.ir.>
To: <bugtraq@securityfocus.com.>
Subject: Sql injection in BLOG:CMS
Date: Thu, 07 Sep 2006 09:38:52 +0430
User-Agent: Hackers.ir/1.0
MIME-Version: 1.0
Content-Type: text/plain;charset=utf-8
Content-Transfer-Encoding: 8bit
Importance: Normal
X-Priority: 3 (Normal)
X-Mailer: Hackers.ir/1.0
X-Virus-Scanned: antivirus-gw at tyumen.ru
Hi,
There are some sql injections in BLOG:CMS v4.1 (and maybe before versions) ,
which can be exploited by both users and non user visitors :
The "xagent", "xpath", "xreferer" and "xdns" parameters are not checked
properly before passed to sql query in /admin/plugins/NP_Log.php .
The "pitem" parameter is not checked properly in /admin/plugins/NP_Poll.php .
The "pageRef" variable is not set properly for logged in users
in /admin/plugins/NP_Referrer.php .
Version 4.1.1 has been released (http://blogcms.com/) .
The original advisory (in Persian) is located at :
http://www.hackers.ir/advisories/blogcms.html
- Omid