VID |
210019 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Woltlab Burning Board Lite is vulnerable to an SQL injection vulnerability via the threadvisit Cookie parameter. WoltLab's Burning Board and Burning Board Lite are forum software packages that use PHP and MySQL. Woltlab Burning Board Lite (WBBlite) version 1.0.2 is vulnerable to SQL injection, caused by improper validation of user-supplied input in the decode_cookie() function in the thread.php script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://archives.neohapsis.com/archives/bugtraq/2006-11/0484.html http://retrogod.altervista.org/wbblite_102_sql_mqg_bypass.html http://www.frsirt.com/english/advisories/2006/4694 http://www.milw0rm.com/exploits/2841 http://secunia.com/advisories/23077
* Platforms Affected: Woltlab Burning Board Lite version 1.0.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of WoltLab Burning Board (wBB) at http://www.woltlab.com/wbb/ |
Related URL |
CVE-2006-6237 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
30561 (ISS) |
|