Korean
<< Back
VID 210010
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Loudblog program is vulnerable to an SQL injection vulnerability via the 'id' parameter. Loudblog is a Content Management System (CMS) for publishing audio content on the web written in PHP. Loudblog version 0.5 and earlier versions are vulnerable to an SQL injection vulnerability, caused by improper filtering of user-supplied input passed to the 'id' parameter of the 'index.php' script If the 'magic_quotes_gpc' option is disabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself. In addition, it can also be exploited to bypass authentication.

* References:
http://retrogod.altervista.org/loudblog_05_sql.html
http://www.frsirt.com/english/advisories/2006/2934
http://secunia.com/advisories/21157
http://www.securityfocus.com/archive/1/archive/1/440763/100/0/threaded

* Platforms Affected:
Loudblog version 0.5 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Loudblog (0.5.1 or later), available from the Loudblog Download Web site at http://loudblog.de/index.php?s=download
Related URL CVE-2006-3832 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)