XennoBB 'Profile.PHP'SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110749 漏洞类型 SQL注入
发布时间 2006-08-07 更新时间 2006-08-26
CVE编号 CVE-2006-4025 CNNVD-ID CNNVD-200608-108
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28347
https://cxsecurity.com/issue/WLB-2006080053
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-108
|漏洞详情
XennoBB2.1.0及早期版本的profile.php脚本存在SQL注入漏洞,远程认证用户可借助:(1)个人专区中的bday_day参数,(2)bday_month参数,和(3)bday_year参数执行任意SQL指令。
|漏洞EXP
source: http://www.securityfocus.com/bid/19374/info

XennoBB is prone to multiple SQL injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. 

A successful attack could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

These issues affect version 2.1.0; earlier versions may also be vulnerable.

Submitting the following as a POST request to profile.php is sufficient to exploit these issues and gain administrative privileges:

form_sent=1&form[sex]=a&bday_day=1&bday_month=2&bday_year=", group_id=1, birthday="
|参考资料

来源:BID
名称:19374
链接:http://www.securityfocus.com/bid/19374
来源:BUGTRAQ
名称:20060806XennoBB<=2.1.0"birthday"SQLinjection
链接:http://www.securityfocus.com/archive/1/archive/1/442423/100/0/threaded
来源:VUPEN
名称:ADV-2006-3190
链接:http://www.frsirt.com/english/advisories/2006/3190
来源:SECTRACK
名称:1016643
链接:http://securitytracker.com/id?1016643
来源:SECUNIA
名称:21409
链接:http://secunia.com/advisories/21409
来源:XF
名称:xennobb-birthday-sql-injection(28257)
链接:http://xforce.iss.net/xforce/xfdb/28257
来源:SREASON
名称:1344
链接:http://securityreason.com/securityalert/1344