Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Forum/Board/Portal)  >   betaparticle blog Vendors:
betaparticle blog Input Validation Bugs in 'id' and 'fldGalleryID' Parameters Permit SQL Injection
SecurityTracker Alert ID:  1015788
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 20 2006
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  
Version(s): 6.0 and prior versions
Description:   A vulnerability was reported in betaparticle blog. A remote user can inject SQL commands.

The software does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

The 'id' parameter in 'template_permalink.asp' and the 'fldGalleryID' parameter in 'template_gallery_detail.asp' is affected.

A demonstration exploit URL is provided:


The vendor was notified on March 18, 2006.

Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI reported this vulnerability.

Impact:   A remote user can execute SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL Injection

--Security Report--
Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL Injection 
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
Date: 18/03/06 05:27 PM
ICQ: 10072
Vendor: BetaParticle (
Version: 6.0 and prior versions must be affected.
About: Via this method remote attacker can inject arbitrary SQL query.
Level: Critical
GET -> http://[site]/bpdir/template_permalink.asp?id=[SQLQuery]
GET -> http://[site]/bpdir/template_gallery_detail.asp?fldGalleryID=[SQLQuery]
Example ->
With this example remote attacker could get admin's pass and can login from
* 18/03/2006: Vulnerability found.
* 18/03/2006: Contacted with vendor and waiting reply.
Click here and get exploit for this advisory


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC