{ "schema_version": "1.4.0", "id": "GHSA-f8v4-f26h-67pp", "modified": "2022-05-01T02:15:03Z", "published": "2022-05-01T02:15:03Z", "aliases": [ "CVE-2005-3153" ], "details": "login.php in myBloggie 2.1.3 beta and earlier allows remote attackers to bypass a whitelist regular expression and conduct SQL injection attacks via a username parameter with SQL after a null character, which causes the whitelist check to succeed but injects the SQL into a query string, a different vulnerability than CVE-2005-2838. NOTE: it is possible that this is actually a bug in PHP code, in which case this should not be treated as a myBloggie vulnerability.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3153" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=112818273307878&w=2" }, { "type": "WEB", "url": "http://mywebland.com/forums/showtopic.php?t=399" }, { "type": "WEB", "url": "http://rgod.altervista.org/mybloggie213b.html" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/42" }, { "type": "WEB", "url": "http://securitytracker.com/id?1014995" }, { "type": "WEB", "url": "http://www.osvdb.org/19935" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-10-05T22:02:00Z" } }