Korean
<< Back
VID 21595
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The bBlog, according to its version number, has multiple input validation vulnerabilities in 'index.php' script. bBlog is a blog system written in PHP. bBlog versions 0.74 and earlier are vulnerable to multiple input validation vulnerabilities, which can be exploited by remote attackers to conduct cross-site scripting and SQL injection attacks.

1) Multiple Cross-Site Scripting Vulnerabilities: Input passed to the blog entry title field and the comment body text field in "index.php" script is not properly sanitized before being returned to users. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.
2) SQL Injection Vulnerability: Input passed to the "postid" parameter in "index.php" isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

* Note: This check solely relied on the version number of the bBlog software installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://sourceforge.net/tracker/index.php?func=detail&aid=1188735&group_id=81992&atid=564683
http://www.osvdb.org/displayvuln.php?osvdb_id=15754
http://www.osvdb.org/displayvuln.php?osvdb_id=15755
http://www.osvdb.org/displayvuln.php?osvdb_id=15756
http://securitytracker.com/id?1013811

* Platforms affected:
Eaden McKee, bBlog versions 0.74 and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of May 2005.

Upgrade to the latest version of bBlog (0.74 later), when new version fixed this problem becomes available from the bBlog Web site at http://www.bblog.com/download.php
Related URL CVE-2005-1309 (CVE)
Related URL 13397,13398 (SecurityFocus)
Related URL (ISS)