vendor:
SoftBB
by:
LOTFREE TEAM
7,5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: SoftBB
Affected Version From: 0.1
Affected Version To: 0.1
Patch Exists: YES
Related CWE: N/A
CPE: a:softbb:softbb:0.1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2006
SoftBB BruteForcing tool
The field 'mail' in reg.php is used directly in a SQL query which can be used to deduce the result of some sql querys according to the error messages returned. The exploit test the characters of the md5 hash one by one using a special query.
Mitigation:
Input validation should be used to prevent SQL injection attacks.