login.php in myBloggie 2.1.3 beta and earlier allows remote attackers to bypass a whitelist regular expression and conduct SQL injection attacks via a username parameter with SQL after a null character, which causes the whitelist check to succeed but injects the SQL into a query string, a different vulnerability than CVE-2005-2838. NOTE: it is possible that this is actually a bug in PHP code, in which case this should not be treated as a myBloggie vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T23:01:57.966Z
Reserved: 2005-10-05T00:00:00
Link: CVE-2005-3153

No data.

Status : Modified
Published: 2005-10-05T22:02:00.000
Modified: 2024-11-21T00:01:14.180
Link: CVE-2005-3153

No data.