Korean
<< Back
VID 21709
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The MyBulletinBoard program is vulnerable to multiple SQL injection vulnerabilities in multiple scripts. MyBulletinBoard is a freely available forum package developed in PHP and MYSQL. MyBulletinBoard versions 1.00 RC1 through 1.00 RC4 allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'location' variable of the 'global.php' script, the 'username' parameter of the 'admin/index.php' script, the 'action' parameter of the 'search.php' script and the 'polloptions' parameter of the 'polls.php' script. If the magic_quotes_gpc option is disabled, these vulnerabilities could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0397.html
http://www.securityfocus.com/archive/1/407960
http://www.securityfocus.com/archive/1/408624
http://www.securityfocus.com/archive/1/409523

* Platforms Affected:
MyBB Group, MyBulletinBoard versions 1.00 RC1 through 1.00 RC4
Any operating system Any version
Recommendation No upgrade or patch available as of September 2005.

Upgrade to the latest version of MyBulletinBoard, when new fixed version becomes available from the MyBB Group Download Web site at http://www.mybboard.com

As a workaround, set "magic_quotes_gpc" to "On" in php.ini file.
Related URL CVE-2005-2580,CVE-2005-2778 (CVE)
Related URL 14553,14615,14684 (SecurityFocus)
Related URL 21798 (ISS)