Lucene search

K

SMF11SQL.txt

🗓️ 14 Dec 2005 00:00:00Reported by trueend5Type 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 25 Views

New advisory for Simple Machines Forum 1.1 rc1 with SQL Injection vulnerabilit

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`KAPDA New advisory  
  
Vendor: http://www.simplemachines.org/  
Vulnerable Version:SMF 1.1 rc1, Other versions also  
may be affected.  
Bug: SQL Injection  
Exploitation: Remote with browser  
  
Description:  
--------------------  
Simple Machines Forum is a most widely used PHP-based  
message board system that uses a MySQL database.  
  
Vulnerability:  
--------------------  
Lets Look at the Source Code of 'Memberlist.php' :  
.  
.  
------------/CUT/------------  
if (!is_numeric($_REQUEST['start']))  
{  
$request = db_query("  
SELECT COUNT(ID_MEMBER)  
FROM {$db_prefix}members  
WHERE LOWER(SUBSTRING(realName, 1, 1)) < '" .  
substr(strtolower($_REQUEST['start']), 0, 1) . "'  
AND is_activated = 1", __FILE__, __LINE__);  
list ($_REQUEST['start']) =  
mysql_fetch_row($request);  
mysql_free_result($request);  
}  
------------/CUT/------------  
.  
.  
  
As shown up, The script does not properly validate  
user-supplied input in 'start' that may allow a remote  
user to launch Sql injection attacks. A Registered  
user can create specially crafted parameter values  
that will execute SQL commands on the underlying  
database.  
  
  
Demonstration URL :  
-----------------------------  
http://example.com/smf/index.php?action=mlist;sa=all;start='[SQL]  
  
Solution:  
--------------------  
There is no vendor supplied patch for this issue at  
this time.  
Our recommendation for a temporary fix:  
In /Sources/Memberlist.php find these lines:   
  
//-------Start----  
if (!is_numeric($_REQUEST['start']))  
{  
//-------End------  
  
And add these lines after those:  
  
//-------Start----  
$Pattern="[A-Za-z]";  
if (!eregi($Pattern, $_REQUEST['start'])) die('Hacking  
attempt...');  
//-------End------  
  
Original Advisory:  
--------------------  
http://irannetjob.com/content/view/173/28/  
  
Credit :  
--------------------  
Discovered & released by trueend5 (trueend5 kapda ir)  
Security Science Researchers Institute Of Iran  
[http://www.KAPDA.ir]  
  
__________________________________________________  
Do You Yahoo!?  
Tired of spam? Yahoo! Mail has the best spam protection around   
http://mail.yahoo.com   
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo