CVE-2008-2626

Battleblog < 1.25 - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in comment.asp in Battle Blog 1.25 and earlier allows remote attackers to execute arbitrary SQL commands via the entry parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Bl@ckbe@rD · textwebappsphp
https://www.exploit-db.com/exploits/5731

References (6)

Core 6
Core References
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1737/references
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/29507
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/42818
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5731
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30503

Scores

EPSS 0.0090
EPSS Percentile 75.7%

Details

CWE
CWE-89
Status published
Products (4)
battleblog/battleblog 1.0d build_3 (5 CPE variants)
battleblog/battleblog 1.05 build_1
battleblog/battleblog 1.20 build_1 (3 CPE variants)
battleblog/battleblog < 1.25
Published Jun 10, 2008
Tracked Since Feb 18, 2026