Korean
<< Back
VID 21844
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Geeklog program is vulnerable to multiple vulnerabilities which exist in versions prior to 1.3.11sr4 or 1.4.0sr1. Geeklog is an open-source Web log software written in PHP and MySQL. Geeklog versions prior to 1.3.11sr4 or 1.4.0sr1 are vulnerable to multiple input validation vulnerabilities, which can be exploited by a remote attacker to conduct SQL injection attacks, disclose potentially sensitive information and potentially to compromise a vulnerable system.

1) Multiple SQL injection vulnerabilities: By sending specially-crafted SQL statements to the users.php script using the $userid variable or to the lib-sessions.php script using the $sessid variable, a remote attacker could execute arbitrary SQL commands.
2) An arbitrary local file include vulnerability: By sending a specially-crafted URL request to the lib-common.php script using the 'language' parameter to include a malicious file in the local system, a remote attacker could execute arbitrary PHP code on the vulnerable system.

* References:
http://www.geeklog.net/filemgmt/singlefile.php?lid=670
http://www.geeklog.net/filemgmt/singlefile.php?lid=671
http://www.gulftech.org/?node=research&article_id=00102-02192006
http://secunia.com/advisories/18920/

* Platforms Affected:
Geeklog versions prior to 1.3.11sr4
Geeklog versions prior to 1.4.0sr1
Any operating system Any version
Recommendation Upgrade to the latest version of Geeklog (1.3.11sr4 or 1.4.0sr1 or later), available from the Geeklog Web site at http://www.geeklog.net/filemgmt/viewcat.php?cid=8
Related URL CVE-2006-0823,CVE-2006-0824 (CVE)
Related URL 16755 (SecurityFocus)
Related URL 24775,24776 (ISS)