4nGuestbook admin.php nbid Variable SQL Injection

2004-03-15T12:42:06
ID OSVDB:19865
Type osvdb
Reporter Janek Vind "waraxe"(come2waraxe@yahoo.com)
Modified 2004-03-15T12:42:06

Description

Vulnerability Description

4nGuestBook contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'admin.php' script not properly sanitizing user-supplied input to the 'nbid' variable. This may allow a remote attacker to inject or manipulate SQL queries in the backend database.

Technical Description

This flaw is only exploitable with full administrative privileges.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

4nGuestBook contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'admin.php' script not properly sanitizing user-supplied input to the 'nbid' variable. This may allow a remote attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/nuke71/admin.php?op=NukebookEditEntry&nbid=-2%20UNION%20SELECT%20null%20/*

References:

Vendor URL: http://www.warp-speed.de/ Security Tracker: 1009450 Secunia Advisory ID:11133 Related OSVDB ID: 4295 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2004-03/0139.html CVE-2004-2354