VID |
210020 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Woltlab Burning Board Lite is vulnerable to an SQL injection vulnerability via the 'wbb_userid' parameter. WoltLab's Burning Board and Burning Board Lite are forum software packages that use PHP and MySQL. Woltlab Burning Board Lite (WBBlite) version 1.0.2 is vulnerable to SQL injection, caused by improper validation of user-supplied input in the Zend_Hash_Del_Key_Or_Index function. If PHP's 'register_globals' setting is enabled and 'magic_quotes_gpc' setting is disabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://retrogod.altervista.org/wbblite_102_sql.html http://archives.neohapsis.com/archives/bugtraq/2006-11/0484.html http://www.milw0rm.com/exploits/2842
* Platforms Affected: Woltlab Burning Board Lite version 1.0.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of WoltLab Burning Board (wBB) at http://www.woltlab.com/wbb/ |
Related URL |
CVE-2006-6289 (CVE) |
Related URL |
21265 (SecurityFocus) |
Related URL |
30522 (ISS) |
|