18 lines
No EOL
701 B
Text
18 lines
No EOL
701 B
Text
source: https://www.securityfocus.com/bid/14762/info
|
|
|
|
MyBulletinBoard is prone to multiple SQL injection vulnerabilities. These issues are due to a lack of proper sanitization of user-supplied input before using it in an SQL query.
|
|
|
|
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
|
|
|
|
misc.php :-
|
|
|
|
http://www.example.com/misc.php?action=rules&fid=-1' [SQL]
|
|
|
|
newreply.php :-
|
|
|
|
One may inject SQL data by submitting a HTTP POST with a modification
|
|
of the http header as follows:
|
|
|
|
Content-Disposition: form-data; name="icon"\r\n
|
|
\r\n
|
|
-1') [SQL] /*\r\n |