VID |
21862 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The MyBulletinBoard program is vulnerable to an SQL injection attack via the 'forums[]' parameter. MyBulletinBoard is a freely available forum package developed in PHP and MYSQL. MyBulletinBoard version 1.04 and earlier versions could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'forums[]' parameter of the 'search.php' script. If PHP's 'register_globals' setting is enabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://www.securityfocus.com/archive/1/426631/30/30/threaded http://secunia.com/advisories/19061/
* Platforms Affected: MyBB Group, MyBulletinBoard version 1.04 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of MyBulletinBoard (1.1 or later), available from the MyBB Group Web site at http://www.mybboard.com
As a workaround, disable PHP's 'register_globals' setting. |
Related URL |
CVE-2006-1065 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
25018 (ISS) |
|