Korean
<< Back
VID 21644
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description A version of PunBB software which is older than 1.2.6 is detected as installed on the host. PunBB is a freely available, open source PHP-based bulletin board software. PunBB versions prior to 1.2.6 are vulnerable to multiple vulnerabilities, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system:

1) Input passed to the "temp" array parameter in the "profile.php" script isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Successful exploitation requires that "register_globals" is enabled.
2) An error in the template system can be exploited to include arbitrary local files via e.g. the "redirect_url" parameter. This can further be exploited to execute arbitrary PHP code by referencing a specially crafted avatar image containing PHP code.
3) Certain unspecified input in the administrative interface isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

* Note: This check solely relied on the version number of the PunBB installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.hardened-php.net/advisory-082005.php
http://www.hardened-php.net/advisory-092005.php
http://archives.neohapsis.com/archives/bugtraq/2005-07/0118.html
http://archives.neohapsis.com/archives/bugtraq/2005-07/0119.html
http://secunia.com/advisories/15990/

* Platforms Affected:
Rickard Andersson, PunBB versions prior to 1.2.6
Any operating system Any version
Recommendation Upgrade to the latest version of PunBB (1.2.6 or later), available from the PunBB Download Web site at http://www.punbb.org/downloads.php
Related URL CVE-2005-2193 (CVE)
Related URL 14195,14196 (SecurityFocus)
Related URL 21299,21387 (ISS)