VID |
210040 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Woltlab Burning Board is vulnerable to an SQL injection vulnerability via the 'boardids' parameter. WoltLab's Burning Board and Burning Board Lite are forum software packages that use PHP and MySQL. Woltlab Burning Board Lite (WBBlite) version 1.0.2 and earlier versions and Burning Board version 2.3.6 and earlier versions are vulnerable to SQL injection vulnerability, caused by improper validation of user-supplied input passed to the 'boardids' parameter of the 'search.php' script. Regardless of PHP's 'register_globals' and 'magic_quotes_gpc' settings, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://milw0rm.com/exploits/3143 http://milw0rm.com/exploits/3144 http://milw0rm.com/exploits/3146
* Platforms Affected: Woltlab Burning Board Lite version 1.0.2 and earlier versions Woltlab Burning Board version 2.3.6 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of WoltLab Burning Board (wBB) from the WoltLab Burning Board Web site at http://www.woltlab.com/wbb |
Related URL |
CVE-2007-0388 (CVE) |
Related URL |
22096 (SecurityFocus) |
Related URL |
31550 (ISS) |
|