Re: Mybb 1.6.8 'announcements.php' Sql Injection Vulnerabilitiy

看板Bugtraq作者時間13年前 (2012/06/27 04:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串5/5 (看更多)
Isn't $aid already escaped by intval() ? Gianluca On Fri, Jun 22, 2012 at 10:13 PM, Yaniv Shaked <yaniv0a@gmail.com> wrote: > > Look at the code at announcements.php: > > $aid =3D intval($mybb->input['aid']); > > [Boring lines=85] > > [Boring lines=85] > > $query =3D $db->query(" > =A0 =A0 =A0 =A0SELECT u.*, u.username AS userusername, a.*, f.* > =A0 =A0 =A0 =A0FROM ".TABLE_PREFIX."announcements a > =A0 =A0 =A0 =A0LEFT JOIN ".TABLE_PREFIX."users u ON (u.uid=3Da.uid) > =A0 =A0 =A0 =A0LEFT JOIN ".TABLE_PREFIX."userfields f ON (f.ufid=3Du.uid) > =A0 =A0 =A0 =A0WHERE a.startdate<=3D'$time' AND (a.enddate>=3D'$time' OR > a.enddate=3D'0') AND a.aid=3D'$aid' > "); > > $announcementarray =3D $db->fetch_array($query); > > Complete the missing part :) > > -- > Thanks, > Yaniv > > On Jun 22, 2012, at 8:58 AM, Henri Salo wrote: > > > On Thu, Jun 21, 2012 at 02:44:59PM +0000, Amir@irist.ir wrote: > >> a bug in Mybb 1.6.8 'announcements.php' that allows to us to occur a > >> Sql Injection on a Remote machin. > >> > >> > >> > >> > >> > >> ######################################################################= ################### > >> # > >> # Exploit Title : Mybb 1.6.8 'announcements.php' Sql Injection > >> Vulnerabilitiy > >> # > >> # Author : IrIsT.Ir > >> # > >> # Discovered By : Am!r > >> # > >> # Home : http://IrIsT.Ir/forum > >> # > >> # Software Link : http://www.mybb.com/ > >> # > >> # Security Risk : High > >> # > >> # Version : All Version > >> # > >> # Tested on : GNU/Linux Ubuntu - Windows Server - win7 > >> # > >> # Dork : "Powered By Mybb" > >> # > >> > >> ######################################################################= ################### > >> # > >> # Expl0iTs : > >> # > >> # [TarGeT]/Patch/announcements.php?aid=3D1[Sql] > >> # > >> # > >> > >> ######################################################################= ################### > >> # > >> # Greats : B3HZ4D - Crim3R - nimaarek - Net.Edit0r - A.Cr0x - G3n3rall > >> - R3ZA BLACK HAT - > >> # > >> # TaK.FaNaR - m3hdi - F@rid - joker_s - H4x0r - dr.tofan - > >> skote_vahshat - d3c0d3r - > >> # > >> # Dr.Security - Mr.Xpr - Bl4ck_king - hellboy - Shekaf & All Members I= n > >> IrIsT.Ir > >> # > >> > >> ######################################################################= ################### > > > > Could not reproduce. Could you give working PoC? > > > > - Henri Salo >
文章代碼(AID): #1FwXn2xH (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #1FwXn2xH (Bugtraq)