Blaze Apps 1.x - SQL Injection / HTML Injection
Author: AmnPardaz Security Research Team
type: webapps
platform: multiple
port: nan
date_added: 2010-01-19
date_updated: 2014-07-07
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/40212/info
Blaze Apps is prone to multiple SQL-injection vulnerabilities and an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker may exploit the HTML-injection issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials, control how the site is displayed, and launch other attacks.
The attacker may exploit the SQL-injection issues to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Blaze Apps 1.4.0.051909 and prior are vulnerable.
HTML Injection
<script>alert('Stored XSS')</script>
SQL Injection
aa' OR [SQL] OR 'a'='1