Dear all,
I have discovered some vulnerabilities in Basic Forum, developed by JM LLC.
Cheers,
Sp3ctrecore
########## ADVISORY ##########
================================================
Basic Forum by JM LLC - Multiple Vulnerabilities
================================================
Software................: Basic Forum
Software link...........: http://www.jmagness.com/download/Basic_Forum.zip
Vendor..................: JM LLC
Vendor homepage.........: http://www.jmagness.com
Exploit author..........: Sp3ctrecore
Contact.................: sp3ctrecore[at]gmail[dot]com
--------
OVERVIEW
--------
Basic Forum is affected by multiple vulnerabilities.
-------------------
DISCLOSURE TIMELINE
-------------------
04/07/2013 -- Multiple vulnerabilities discovered and reported to the vendor.
19/07/2013 -- The vendor confirmed the vulnerabilities, but has no
time to fix them.
24/07/2013 -- Public disclosure.
---------------
VULNERABILITIES
---------------
[01] MULTIPLE SQL INJECTIONS
I. new.php - title parameter (POST request).
II. new.php - post parameter (POST request).
III. post.php?id=1 - reply parameter (POST request).
[02] MULTIPLE CROSS-SITE SCRIPTING
I. user.php - firstname parameter (POST request): stored XSS.
II. user.php - bio parameter (POST request): stored XSS.
III. new.php - title parameter (POST request): stored XSS.
IV. new.php - post parameter (POST request): stored XSS.
[03] Cross-site Request Forgery
I. user.php - firstname parameter (POST request).
II. user.php - email parameter (POST request).
III. user.php - password parameter (POST request).
IV. user.php - bio parameter (POST request).
V. new.php - title parameter (POST request).
VI. new.php - post parameter (POST request).
VII. post.php - reply parameter (POST request).
{"id": "SECURITYVULNS:DOC:29674", "bulletinFamily": "software", "title": "Basic Forum by JM LLC - Multiple Vulnerabilities", "description": "\r\n\r\nDear all,\r\nI have discovered some vulnerabilities in Basic Forum, developed by JM LLC.\r\n\r\nCheers,\r\nSp3ctrecore\r\n\r\n\r\n########## ADVISORY ##########\r\n\r\n\r\n================================================\r\nBasic Forum by JM LLC - Multiple Vulnerabilities\r\n================================================\r\n\r\nSoftware................: Basic Forum\r\nSoftware link...........: http://www.jmagness.com/download/Basic_Forum.zip\r\nVendor..................: JM LLC\r\nVendor homepage.........: http://www.jmagness.com\r\n\r\nExploit author..........: Sp3ctrecore\r\nContact.................: sp3ctrecore[at]gmail[dot]com\r\n\r\n\r\n--------\r\nOVERVIEW\r\n--------\r\n\r\nBasic Forum is affected by multiple vulnerabilities.\r\n\r\n\r\n-------------------\r\nDISCLOSURE TIMELINE\r\n-------------------\r\n\r\n04/07/2013 -- Multiple vulnerabilities discovered and reported to the vendor.\r\n19/07/2013 -- The vendor confirmed the vulnerabilities, but has no\r\ntime to fix them.\r\n24/07/2013 -- Public disclosure.\r\n\r\n\r\n---------------\r\nVULNERABILITIES\r\n---------------\r\n\r\n[01] MULTIPLE SQL INJECTIONS\r\n\r\nI. new.php - title parameter (POST request).\r\nII. new.php - post parameter (POST request).\r\nIII. post.php?id=1 - reply parameter (POST request).\r\n\r\n\r\n[02] MULTIPLE CROSS-SITE SCRIPTING\r\n\r\nI. user.php - firstname parameter (POST request): stored XSS.\r\nII. user.php - bio parameter (POST request): stored XSS.\r\nIII. new.php - title parameter (POST request): stored XSS.\r\nIV. new.php - post parameter (POST request): stored XSS.\r\n\r\n\r\n[03] Cross-site Request Forgery\r\n\r\nI. user.php - firstname parameter (POST request).\r\nII. user.php - email parameter (POST request).\r\nIII. user.php - password parameter (POST request).\r\nIV. user.php - bio parameter (POST request).\r\nV. new.php - title parameter (POST request).\r\nVI. new.php - post parameter (POST request).\r\nVII. post.php - reply parameter (POST request).\r\n\r\n", "published": "2013-07-29T00:00:00", "modified": "2013-07-29T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:29674", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:48", "edition": 1, "viewCount": 58, "enchantments": {"score": {"value": 0.1, "vector": "NONE"}, "dependencies": {"references": []}, "backreferences": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:13227"]}]}, "exploitation": null, "vulnersScore": 0.1}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647589307, "score": 1659730939}}