First published: Wed Dec 14 2005(Updated: )
Multiple "potential" SQL injection vulnerabilities in myBloggie 2.1.3 beta might allow remote attackers to execute arbitrary SQL commands via (1) the category parameter in add.php, (2) the cat_desc parameter in addcat.php, (3) the level and user parameters in adduser.php, (4) the post_id parameter in del.php, (5) the cat_id parameter in delcat.php, (6) the comment_id parameter in delcomment.php, (7) the id parameter in deluser.php, (8) the post_id and category parameter in edit.php, (9) the cat_id and cat_desc parameters in editcat.php, and (10) the id, level, and user parameters in edituser.php. NOTE: the username/login.php vector is already identified by CVE-2005-2838.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
myWebland myBloggie | =2.1.3_beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4225 has a medium severity rating due to the potential for SQL injection attacks.
To fix CVE-2005-4225, upgrade myBloggie to a version that resolves these vulnerabilities.
CVE-2005-4225 affects the add.php, addcat.php, and adduser.php components in myBloggie 2.1.3 beta.
Yes, CVE-2005-4225 can allow remote attackers to execute arbitrary SQL commands, potentially leading to data breaches.
Remote attackers with the ability to manipulate the vulnerable parameters in myBloggie 2.1.3 beta can exploit CVE-2005-4225.