| VID |
21594 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The bBlog software, according to its version number, has an SQL injection vulnerability in the rss.php script. bBlog is a blog system written in PHP. bBlog versions 0.73 and earlier allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input to the 'p' array parameter of the rss.php script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* Note: This check solely relied on the version number of the bBlog software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/2004-09/0461.html http://secunia.com/advisories/12691/
* Platforms affected: Eaden McKee, bBlog versions 0.73 and earlier Any operating system Any version |
| Recommendation |
Upgrade to the latest version of bBlog (0.74 or later), available from the bBlog Web site at http://www.bblog.com/download.php |
| Related URL |
CVE-2004-1570 (CVE) |
| Related URL |
11303 (SecurityFocus) |
| Related URL |
17552 (ISS) |
|