Vulnerability Description
SQL injection vulnerability in comment.asp in Battle Blog 1.25 and earlier allows remote attackers to execute arbitrary SQL commands via the entry parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Battleblog | Battleblog | <= 1.25 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/30503Vendor Advisory
- http://www.davethewebguy.com/battleblog/article.asp?entry=24
- http://www.securityfocus.com/bid/29507
- http://www.vupen.com/english/advisories/2008/1737/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42818
- https://www.exploit-db.com/exploits/5731
- http://secunia.com/advisories/30503Vendor Advisory
- http://www.davethewebguy.com/battleblog/article.asp?entry=24
- http://www.securityfocus.com/bid/29507
- http://www.vupen.com/english/advisories/2008/1737/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42818
- https://www.exploit-db.com/exploits/5731
FAQ
What is CVE-2008-2626?
CVE-2008-2626 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in comment.asp in Battle Blog 1.25 and earlier allows remote attackers to execute arbitrary SQL commands via the entry parameter.
How severe is CVE-2008-2626?
CVE-2008-2626 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-2626?
Check the references section above for vendor advisories and patch information. Affected products include: Battleblog Battleblog.