header-logo
Suggest Exploit
vendor:
phpGB
by:
SecurityFocus
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: phpGB
Affected Version From: phpGB
Affected Version To: phpGB
Patch Exists: YES
Related CWE: N/A
CPE: a:phpgb:phpgb
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

phpGB SQL Injection Vulnerability

phpGB is vulnerable to a SQL injection vulnerability due to the bulletin board relying on the PHP magic_quotes_gpc directive to sanitize variables that are used in SQL queries. If magic_quotes_gpc is not enabled, then it will be possible for attackers to mount SQL injection attacks through the guestbook. SQL injection may allow attackers to corrupt the database and gain administrative guestbook privileges. An existing administrator name (default is admin) can be used with the password "' OR 'a'='a" to exploit this vulnerability.

Mitigation:

Ensure that the PHP magic_quotes_gpc directive is enabled.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/5673/info

phpGB is vulnerable to a SQL injection vulnerability.

The cause of the issue is that the bulletin board relies on the PHP magic_quotes_gpc directive to sanitize variables that are used in SQL queries.

If magic_quotes_gpc is not enabled, then it will be possible for attackers to mount SQL injection attacks through the gestbook. SQL injection may allow attackers to corrupt the database. It is also possible to exploit this issue to gain administrative guestbook privileges.

Use an existing administrator name (default is admin) and use the
following password:
"' OR 'a'='a"