vendor:
Gnuboard
by:
flyh4t
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Gnuboard
Affected Version From: Gnuboard <= 4.33.02
Affected Version To: Gnuboard <= 4.33.02
Patch Exists: YES
Related CWE: CVE-2011-4066
CPE: a:sir:gnuboard:4.33.02
Metasploit:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux+Apache
2011
Gnuboard <= 4.33.02 PATH_INFO SQL INJECTION Vulnerability
Bug found By Flyh4t & alpha.liu, SIR GNUBoard(http://sir.co.kr) is a widely used bulletin board system of Korea. It is freely available for all platforms that supports PHP and MySQL. But we find a SQL INJECTION affects SIR GNUBoard version 4.33.02. The codes can be download here http://sir.co.kr/main/gnuboard4/. The vulnerability code is in /bbs/tb.php, where the $_SERVER[PATH_INFO] is not affected by the magic_quotes_gpc set of php, allowing arbitrary sql code to be injected through $_SERVER[PATH_INFO]. The $write_table can be injected through $bo_table, leading to sql injection, and no need of single quotes. The Proof of Concept is bbs/tb.php/[sql]/[sql].
Mitigation:
Ensure that the application is not vulnerable to SQL injection attacks by using parameterized queries, stored procedures, and escaping all user-supplied input.