microBlog version 2.0 RC-10 does not properly sanitize the $month and $year variables which can lead to SQL injection.
65733177ff683056d87b26cdbc721cee6bcff520586310c25307d7d1328a6e7e
New eVuln Advisory:
microBlog SQL Injection Vulnerability
https://evuln.com/vulns/35/summary/bt/
--------------------Summary----------------
Software: microBlog
Sowtware's Web Site: https://www.stamcar.com/projekti/microblog/
Versions: 2.0 RC-10
Critical Level: Moderate
Type: SQL Injection
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)
eVuln ID: EV0035
-----------------Description---------------
Vulnerable script: index.php
Variables $month $year isn't properly sanitized before being used in a
SQL query. This can be used to make any SQL query by injecting arbitrary
SQL code.
Administrator's login and password is threatened.
--------------Exploit----------------------
Available at: https://evuln.com/vulns/35/exploit/bt/
--------------Solution---------------------
No Patch available.
--------------Credit-----------------------
Discovered by: Aliaksandr Hartsuyeu (eVuln.com)