APBoard thread.php start Variable SQL Injection

2005-11-20T18:14:39
ID OSVDB:21289
Type osvdb
Reporter ksa_ksa82(ksa_ksa82@hotmail.com)
Modified 2005-11-20T18:14:39

Description

Vulnerability Description

APBoard contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'thread.php' script not properly sanitizing user-supplied input to the 'start' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

APBoard contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'thread.php' script not properly sanitizing user-supplied input to the 'start' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[target]/apboard/thread.php?id=210&start=[SQL]

References:

Vendor URL: http://www.php-zentrale.de Vendor URL: http://www.hotscripts.com/Detailed/9399.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-11/0247.html ISS X-Force ID: 23200 CVE-2005-3746 Bugtraq ID: 15513