Description
SmartBlog 2.0.1 contains a blind SQL injection vulnerability in the 'id_post' parameter of the details controller that allows attackers to extract database information. Attackers can systematically test and retrieve database contents by injecting crafted SQL queries that compare character-by-character of database information.
Problem types
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Product status
Credits
C0wnuts
References
www.exploit-db.com/exploits/48995
www.exploit-db.com/exploits/48995 (ExploitDB-48995)
github.com/smartdatasoft/smartblog (SmartBlog GitHub Repository)
www.vulncheck.com/...es/smartblog-idpost-blind-sql-injection (VulnCheck Advisory: SmartBlog 2.0.1 - 'id_post' Blind SQL injection)