vendor:
XennoBB
by:
SecurityFocus
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: XennoBB
Affected Version From: XennoBB 1.5.2
Affected Version To: XennoBB 1.5.2
Patch Exists: No
Related CWE: N/A
CPE: cpe:a:xennoblog:xennoblog:1.5.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006
XennoBB SQL Injection Vulnerability
XennoBB is prone to an SQL-injection vulnerability that could allow an attacker to influence the structure or logic of SQL queries made by the application. An attacker can submit a forged POST request to topic_post.php?action=post&fid={forum ID here} with the following as the POST data: form_sent=1&form_user={username here}&req_subject=Subject&req_message=Message&submit=1&icon_topic=[SQL]. Successful exploitation leads would lead to the SQL query in the icon_topic parameter being run.
Mitigation:
Ensure that user-supplied input is properly sanitized and validated before being used in SQL queries.