A vulnerability in BLOG:CMS

Blog:CMS is a famous Cms that includes weblog, forum, wiki. Secunia has discovered an advisory about a vulnerability which can be exploited by malicious people to bypass certain security restrictions and to conduct SQL injection attacks:

Input passed via the URL query parameter in index.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that “magic_quotes_gpc” is disabled.
The problem is caused due to improper restrictions to photo/thumb.php. This can be exploited to store arbitrary thumbnails created from local or external images via the “image” parameter.
The vulnerabilities have been confirmed in version 4.1.0. Other versions may also be affected,the solution is to restrict access to photo/thumb.php (e.g. with a .htaccess file).

Blog:CMS è una famosa piattaforma Cms che include weblog, forum, wiki. Secunia ha trovato una vulnerabilità con la quale è possibile eseguire codice malevole bypassando le restrizioni e la sicurezza della piattaforma mediante un attacco SQL injection,ecco il testo:

Input passed via the URL query parameter in index.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that “magic_quotes_gpc” is disabled.
The problem is caused due to improper restrictions to photo/thumb.php. This can be exploited to store arbitrary thumbnails created from local or external images via the “image” parameter.
The vulnerabilities have been confirmed in version 4.1.0. Other versions may also be affected,the solution is to restrict access to photo/thumb.php (e.g. with a .htaccess file).

Author: Dario Salvelli

Growth Hacker, Digital Marketing expert. I work as the Global Social Media Manager of Automobili Lamborghini. Contact me