VID |
210010 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Loudblog program is vulnerable to an SQL injection vulnerability via the 'id' parameter. Loudblog is a Content Management System (CMS) for publishing audio content on the web written in PHP. Loudblog version 0.5 and earlier versions are vulnerable to an SQL injection vulnerability, caused by improper filtering of user-supplied input passed to the 'id' parameter of the 'index.php' script If the 'magic_quotes_gpc' option is disabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself. In addition, it can also be exploited to bypass authentication.
* References: http://retrogod.altervista.org/loudblog_05_sql.html http://www.frsirt.com/english/advisories/2006/2934 http://secunia.com/advisories/21157 http://www.securityfocus.com/archive/1/archive/1/440763/100/0/threaded
* Platforms Affected: Loudblog version 0.5 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Loudblog (0.5.1 or later), available from the Loudblog Download Web site at http://loudblog.de/index.php?s=download |
Related URL |
CVE-2006-3832 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|