Description
|
|
Some vulnerabilities have been discovered in Cells Blog CMS, which can be exploited by malicious people to conduct SQL injection attacks.
1) Input passed via various parameters to multiple scripts is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
List of affected scripts and parameters:
<a href="http://[host]/cells/fourm.php?bgid=[sql]
" target="_blank">http://[host]/cells/fourm.php?bgid=[sql]
</a>
<a href="http://[host]/cells/pub_readpost.php?bgid=[sql]
" target="_blank">http://[host]/cells/pub_readpost.php?bgid=[sql]
</a>
2) Input passed via various parameters to multiple scripts is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
List of affected scripts and parameters:
<a href="http://[host]/cells/fourm.php?bgid=1&fmid=[sql]
" target="_blank">http://[host]/cells/fourm.php?bgid=1&fmid=[sql]
</a>
<a href="http://[host]/cells/pub_readpost.php?bgid=1&ptid=[sql]
" target="_blank">http://[host]/cells/pub_readpost.php?bgid=1&ptid=[sql]
</a>
<a href="http://[host]/cells/pub_nmsg.php?report=pst&bgid=1&fmid=8&ptid=[sql]
" target="_blank">http://[host]/cells/pub_nmsg.php...1&fmid=8&ptid=[sql]
</a>
<a href="http://[host]/cells/pub_openpic.php?fnid=10&bgid=1&fmid=[sql]
" target="_blank">http://[host]/cells/pub_openpic....0&bgid=1&fmid=[sql]
</a>
<a href="http://[host]/cells/my_newpost.php?fmid=[sql]
" target="_blank">http://[host]/cells/my_newpost.php?fmid=[sql]
</a>
The vulnerabilities are confirmed in version 1.21. Other versions may also be affected.
|
|
|
|
Vulnerable Products
|
|
Vulnerable Software: Cells Blog CMS 1.x
|
|
|
|
Solution
|
|
No official solution is currently available. Upgrade to version 3.3, which fixes vulnerability #1.
|
|
|
|
CVE
|
|
|
|
|
|
References
|
|
http://www.exploit-db.com/exploits/19133/
|
|
|
|
Vulnerability Manager Detection
|
|
No
|
|
|
|
IPS Protection
|
|
|
|
|
|