Release date:
Updated on:
Affected Systems:
Cells Blog 3.3
Description:
--------------------------------------------------------------------------------
Bugtraq id: 65094
Cells Blog 3.3 and other versions do not effectively filter users. php, errmsg. multiple SQL injection and cross-site scripting vulnerabilities exist in the implementation of php parameter values, after successful exploitation, attackers can steal cookie authentication configurations, access or modify data, and exploit other vulnerabilities in the underlying database.
<* Source: vinicius777
Link: http://packetstormsecurity.com/files/124927/cellsblog-sqlxss.txt
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Http://www.example.com/cells-v3-3/user.php? Pcid = [SQLite Injection]
Http://www.example.com/cells-v3-3/errmsg.php? Msg = [XSS]
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Cells Blog
----------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://cells.tw