VID |
21841 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Geeklog program is vulnerable to an SQL injection vulnerability in the comment.php script. Geeklog is an open-source Web log software written in PHP and MySQL. Geeklog version 1.3.11 and earlier versions could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'order' parameter of the 'comment.php' script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://www.hardened-php.net/advisory-062005.php http://secunia.com/advisories/15914/
* Platforms Affected: Geeklog version 1.3.11 and earlier versions Linux Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of Geeklog (1.3.11.sr1 or later), available from the Geeklog Web site at http://www.geeklog.net/filemgmt/viewcat.php?cid=8 |
Related URL |
CVE-2005-2152 (CVE) |
Related URL |
14143 (SecurityFocus) |
Related URL |
21287 (ISS) |
|