Korean
<< Back
VID 21863
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The MyBulletinBoard program is vulnerable to SQL injection attacks via the 'comma' parameter. MyBulletinBoard is a freely available forum package developed in PHP and MYSQL. MyBulletinBoard version 1.04 and earlier versions could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the the comma parameter in a cookie used by several scripts. If PHP's 'register_globals' setting is enabled, this vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://www.securityfocus.com/archive/1/426653/30/30/threaded

* Platforms Affected:
MyBB Group, MyBulletinBoard version 1.04 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of MyBulletinBoard (1.1 or later), available from the MyBB Group Web site at http://www.mybboard.com

As a workaround, disable PHP's 'register_globals' setting.
Related URL CVE-2006-0959 (CVE)
Related URL 16631 (SecurityFocus)
Related URL 24953 (ISS)