The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Sql injection in BLOG:CMS


<< Previous INDEX Search src / Print Next >>
From: "Omid" <omid@hackers.ir.>
To: <bugtraq@securityfocus.com.>
Subject: Sql injection in BLOG:CMS
Date: Thu, 07 Sep 2006 09:38:52 +0430
User-Agent: Hackers.ir/1.0
MIME-Version: 1.0
Content-Type: text/plain;charset=utf-8
Content-Transfer-Encoding: 8bit
Importance: Normal
X-Priority: 3 (Normal)
X-Mailer: Hackers.ir/1.0
X-Virus-Scanned: antivirus-gw at tyumen.ru

Hi,
There are some sql injections in BLOG:CMS v4.1 (and maybe before versions) ,
which can be exploited by both users and non user visitors :

The "xagent", "xpath", "xreferer" and "xdns" parameters are not checked
properly before passed to sql query in /admin/plugins/NP_Log.php .

The "pitem" parameter is not checked properly in /admin/plugins/NP_Poll.php .

The "pageRef" variable is not set properly for logged in users
in /admin/plugins/NP_Referrer.php .

Version 4.1.1 has been released (http://blogcms.com/) .

The original advisory (in Persian) is located at :
http://www.hackers.ir/advisories/blogcms.html


- Omid

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру