header-logo
Suggest Exploit
vendor:
MyBulletinBoard
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: MyBulletinBoard
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

MyBulletinBoard Multiple SQL Injection Vulnerabilities

MyBulletinBoard is prone to multiple SQL injection vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied input before using it in an SQL query. Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. misc.php :- http://www.example.com/misc.php?action=rules&fid=-1' [SQL] newreply.php :- One may inject SQL data by submitting a HTTP POST with a modification of the http header as follows: Content-Disposition: form-data; name="icon"rn rn -1') [SQL] /*rn

Mitigation:

Input validation should be used to ensure that untrusted data is not used to construct SQL queries in a way that would allow an attacker to modify the logic of the executed query.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/14762/info

MyBulletinBoard is prone to multiple SQL injection vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied input before using it in an SQL query.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. 

misc.php :-

http://www.example.com/misc.php?action=rules&fid=-1' [SQL]

newreply.php :-

One may inject SQL data by submitting a HTTP POST with a modification
of the http header as follows:

Content-Disposition: form-data; name="icon"\r\n
\r\n
-1') [SQL] /*\r\n