LoudBlog 0.41 - 'index.php?template' Traversal Arbitrary File Access

EDB-ID:

27369




Platform:

PHP

Date:

2006-03-07


source: https://www.securityfocus.com/bid/17023/info
 
Loudblog is prone to multiple input-validation vulnerabilities:
 
- An SQL-injection vulnerability.
- Two local file-include vulnerabilities.
- An information-disclosure vulnerability.
 
These issues allow remote attackers to execute arbitrary PHP script code in the context of the hosting webserver, gain administrative privileges in the web application, and gain access to potentially sensitive information.
 
The SQL-injection vulnerabilities could permit remote attackers to pass malicious input to database queries, resulting in the modification of query logic or other attacks. Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
 
Other attacks may also be possible.
 
Loudblog version 0.41 is vulnerable to these issues; other versions may also be affected.

http://www.example.com/loudblog/index.php?template=../../../loudblog/custom/config.php%00
http://www.example.com/loudblog/loudblog/index.php?page=/../../../audio/cmdphp.mp3%00