VID |
21863 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The MyBulletinBoard program is vulnerable to SQL injection attacks via the 'comma' parameter. MyBulletinBoard is a freely available forum package developed in PHP and MYSQL. MyBulletinBoard version 1.04 and earlier versions could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the the comma parameter in a cookie used by several scripts. If PHP's 'register_globals' setting is enabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://www.securityfocus.com/archive/1/426653/30/30/threaded
* Platforms Affected: MyBB Group, MyBulletinBoard version 1.04 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of MyBulletinBoard (1.1 or later), available from the MyBB Group Web site at http://www.mybboard.com
As a workaround, disable PHP's 'register_globals' setting. |
Related URL |
CVE-2006-0959 (CVE) |
Related URL |
16631 (SecurityFocus) |
Related URL |
24953 (ISS) |
|