CVE-2007-0759

EasyMoblog 0.5.1 - SQL Injection via i or post_id Parameter

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in EasyMoblog 0.5.1 allow remote attackers to execute arbitrary SQL commands via the (1) i or (2) post_id parameter to add_comment.php, which triggers an injection in libraries.inc.php; or (3) the i parameter to list_comments.php, which triggers an injection in libraries.inc.php.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Tal Argoni · textwebappsphp
https://www.exploit-db.com/exploits/29559

References (7)

Core 7
Core References
Third Party Advisory mailing-list x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0052.html
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/22369
Third Party Advisory mailing-list x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0054.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/33636
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/19370

Scores

EPSS 0.0099
EPSS Percentile 77.1%

Details

Status published
Products (1)
umberto_caldera/easymoblog 0.5.1
Published Feb 06, 2007
Tracked Since Feb 18, 2026