header-logo
Suggest Exploit
vendor:
XennoBB
by:
SecurityFocus
8,8
CVSS
HIGH
SQL Injection
89
CWE
Product Name: XennoBB
Affected Version From: XennoBB 1.5.2
Affected Version To: XennoBB 1.5.2
Patch Exists: No
Related CWE: N/A
CPE: cpe:a:xennoblog:xennoblog:1.5.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

XennoBB SQL Injection Vulnerability

XennoBB is prone to an SQL-injection vulnerability that could allow an attacker to influence the structure or logic of SQL queries made by the application. An attacker can submit a forged POST request to topic_post.php?action=post&fid={forum ID here} with the following as the POST data: form_sent=1&form_user={username here}&req_subject=Subject&req_message=Message&submit=1&icon_topic=[SQL]. Successful exploitation leads would lead to the SQL query in the icon_topic parameter being run.

Mitigation:

Ensure that user-supplied input is properly sanitized and validated before being used in SQL queries.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19606/info

XennoBB is prone to an SQL-injection vulnerability that could allow an attacker to influence the structure or logic of SQL queries made by the application.

--------------------- EXPLOIT ---------------------

Submit a forged POST request to

topic_post.php?action=post&fid={forum ID here}

With the following as the POST data:

form_sent=1&form_user={username
here}&req_subject=Subject&req_message=Message&submit=1&icon_topic=[SQL]

Successful exploitation leads would lead to the SQL query in the
icon_topic
parameter being run.