Dariosalvelli.com

Strategic Marketing, AI and Innovation

A vulnerability in BLOG:CMS

Blog:CMS is a famous Cms that includes weblog, forum, wiki. Secunia has discovered an advisory about a vulnerability which can be exploited by malicious people to bypass certain security restrictions and to conduct SQL injection attacks:

Input passed via the URL query parameter in index.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that “magic_quotes_gpc” is disabled.
The problem is caused due to improper restrictions to photo/thumb.php. This can be exploited to store arbitrary thumbnails created from local or external images via the “image” parameter.
The vulnerabilities have been confirmed in version 4.1.0. Other versions may also be affected,the solution is to restrict access to photo/thumb.php (e.g. with a .htaccess file).

Blog:CMS è una famosa piattaforma Cms che include weblog, forum, wiki. Secunia ha trovato una vulnerabilità con la quale è possibile eseguire codice malevole bypassando le restrizioni e la sicurezza della piattaforma mediante un attacco SQL injection,ecco il testo:

Input passed via the URL query parameter in index.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that “magic_quotes_gpc” is disabled.
The problem is caused due to improper restrictions to photo/thumb.php. This can be exploited to store arbitrary thumbnails created from local or external images via the “image” parameter.
The vulnerabilities have been confirmed in version 4.1.0. Other versions may also be affected,the solution is to restrict access to photo/thumb.php (e.g. with a .htaccess file).


Commenti

Lascia un commento

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Questo sito utilizza Akismet per ridurre lo spam. Scopri come vengono elaborati i dati derivati dai commenti.