Description
SQL injection vulnerability in comment.asp in Battle Blog 1.25 and earlier allows remote attackers to execute arbitrary SQL commands via the entry parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Bl@ckbe@rD · textwebappsphp
https://www.exploit-db.com/exploits/5731
References (6)
Core 6
Core References
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1737/references
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/29507
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42818
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5731
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30503
Various Sources x_refsource_confirm
http://www.davethewebguy.com/battleblog/article.asp?entry=24
Scores
EPSS
0.0090
EPSS Percentile
75.7%
Details
CWE
CWE-89
Status
published
Products (4)
battleblog/battleblog
1.0d build_3 (5 CPE variants)
battleblog/battleblog
1.05 build_1
battleblog/battleblog
1.20 build_1 (3 CPE variants)
battleblog/battleblog
< 1.25
Published
Jun 10, 2008
Tracked Since
Feb 18, 2026