Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Web :: Blogs :: bx3802.htm

MyBlog <=0.9.8 Multiple Vulnerabilities



MyBlog <=0.9.8 Multiple Vulnerabilities
MyBlog <=0.9.8 Multiple Vulnerabilities



########################## www.BugReport.ir 
#######################################
#
#=09=09AmnPardaz Security Research Team
#
# Title: MyBlog <=0.9.8 Multiple Vulnerabilities
# Vendor: http://crewdesign.co.uk & http://sourceforge.net/projects/myblog 
# Exploit: Available
# Vulnerable Version: 0.9.8
# Impact: High
# Fix: N/A
# Original Advisory: www.bugreport.ir/?/49 
###################################################################################

####################
1. Description:
####################
=09MyBlog(CMS) is an open source Blog/CMS project. MyBlog(CMS) was  
created as an expandable and easy to use system to manage your website  
with. Its best feature is its customisability, you could use it to run  
your whole site around with forum modules, photo gallery modules and  
all that jazz or you could just run a simple add-on blog using it.
####################
2. Vulnerabilities:
####################
=092.1. Information Leakage. Database information disclosure in  
"/config/mysqlconnection.inc" and/or  
"/config/mysqlconnection%20-%20Copy.inc" or "/admin/setup.php".
=09=092.1.1. Exploit:
=09=09=09=09=09=09Check the exploit/POC section.
=092.2. Cross Site Scripting (XSS). Reflected XSS attack in "index.php"  
in "sort" and "s" parameters.
=09=092.2.1. Exploit:
=09=09=09=09=09=09Check the exploit/POC section.
=092.2. Cross Site Scripting (XSS). Reflected XSS attack in "post.php"  
in "id" parameter.
=09=092.2.1. Exploit:
=09=09=09=09=09=09Check the exploit/POC section.
=092.4. Information Leakage. Source code disclosure in "/config/settings.inc".
=09=092.4.1. Exploit:
=09=09=09=09=09=09Check the exploit/POC section.
####################
3. Exploits/POCs:
####################
=09Original Exploit URL: http://bugreport.ir/index.php?/49/exploit 
####################
4. Solution:
####################
=09Edit the source code to ensure that inputs are properly sanitized.  
Rename the mentioned files in section 2.1, 2.4 and wait for vendor  
patch.
####################
5. Credit:
####################
AmnPardaz Security Research & Penetration Testing Group
Contact: admin[4t}bugreport{d0t]ir
WwW.BugReport.ir 
WwW.AmnPardaz.com 



TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH