vendor:
XennoBB
by:
Luigi Auriemma
3
CVSS
HIGH
SQL-injection
89
CWE
Product Name: XennoBB
Affected Version From: XennoBB 1.1.0
Affected Version To: XennoBB 1.1.2
Patch Exists: No
Related CWE: CVE-2006-4010
CPE: a:xennoblog:xennoblog:1.1.2
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2006
XennoBB SQL-injection Vulnerability
Submit a forged POST request to topic_post.php?action=post&fid={forum ID here} with the following as the POST data: form_sent=1&form_user={username here}&req_subject=Subject&req_message=Message&submit=1&icon_topic=[SQL]. Successful exploitation leads would lead to the SQL query in the icon_topic parameter being run.
Mitigation:
No known mitigation