MercuryBoard post.php Multiple Parameter SQL Injection

2005-01-24T05:03:07
ID OSVDB:13267
Type osvdb
Reporter OSVDB
Modified 2005-01-24T05:03:07

Description

Vulnerability Description

MercuryBoard contains a flaw that will allow an attacker to inject arbitrary SQL code. The problem is that the 't' and 'qu' variable in the post.php script is not verified properly and will allow an attacker to inject or manipulate SQL queries.

Solution Description

Upgrade to version 1.1.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

MercuryBoard contains a flaw that will allow an attacker to inject arbitrary SQL code. The problem is that the 't' and 'qu' variable in the post.php script is not verified properly and will allow an attacker to inject or manipulate SQL queries.

Manual Testing Notes

http://[victim]/index.php?a=post&s=reply&t=0%20UNION%20SELECT%20user_id,%20user_password%20FROM%20mb_users%20/ http://[victim]/index.php?a=post&s=reply&t=1&qu=10000%20UNION%20SELECT%20user_password,user_name%20from%20mb_users%20where%20user_group%20=%201%20limit%201/

References:

Vendor URL: http://www.mercuryboard.com/ Security Tracker: 1012984 Security Tracker: 1013137 Secunia Advisory ID:13870 Related OSVDB ID: 13263 Related OSVDB ID: 13262 Related OSVDB ID: 13264 Related OSVDB ID: 13266 Related OSVDB ID: 13265 Other Advisory URL: http://www.codebug.org/index.php?subaction=showfull&id=1106604257&archive=&start_from=&ucat=1& Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-02/0055.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-01/0252.html CVE-2005-0414