lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <fa12b5161e15272294d3b57104e4077c.hackers@hackers.ir>
Date: Thu, 07 Sep 2006 09:38:52 +0430
From: "Omid" <omid@...kers.ir>
To: <bugtraq@...urityfocus.com>
Subject: Sql injection in BLOG:CMS

Hi,
There are some sql injections in BLOG:CMS v4.1 (and maybe before versions) ,
which can be exploited by both users and non user visitors :

The "xagent", "xpath", "xreferer" and "xdns" parameters are not checked
properly before passed to sql query in /admin/plugins/NP_Log.php .

The "pitem" parameter is not checked properly in /admin/plugins/NP_Poll.php .

The "pageRef" variable is not set properly for logged in users
in /admin/plugins/NP_Referrer.php .

Version 4.1.1 has been released (http://blogcms.com/) .

The original advisory (in Persian) is located at :
http://www.hackers.ir/advisories/blogcms.html


- Omid

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ