Re: [Full-disclosure] Woltab Burning Board SQL Injection usergro

看板Bugtraq作者時間19年前 (2007/03/16 23:25), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
Hi out there, seems to be quite the same exploit as the one appeared in middle January which isn't very public and was marked as "private". The exploit code is nearly the same such as the bug. For a quick fix change the following line if (is_array($_POST['applicationids'])) while (list($applicationid, $val) = each($_POST['applicationids'])) if ($val == 1) $deleteids[] = $applicationid; to this if (is_array(intval($_POST['applicationids']))) while (list($applicationid, $val) = each($_POST['applicationids'])) if ($val == 1) $deleteids[] = $applicationid; Greets /ba PS: I just got informed that it's the same crew discovered this bug as the last time. x666@Safe-mail.net wrote: > Hi, > > A new SQL Injection in the wbb2.x > > [CODE] > > [...] > > [/CODE] > > > > [EXPLOIT] > > [...] > > [/EXPLOIT] > > Greets, > 666 > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
文章代碼(AID): #15-hR_00 (Bugtraq)