CVE-2011-4066 : Détail

CVE-2011-4066

SQL Injection
A03-Injection
0.61%V4
Network
2011-11-04
20h00 +00:00
2017-08-28
10h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

SQL injection vulnerability in bbs/tb.php in Gnuboard 4.33.02 and earlier allows remote attackers to execute arbitrary SQL commands via the PATH_INFO.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 17992

Date de publication : 2011-10-16 22h00 +00:00
Auteur : flyh4t
EDB Vérifié : No

# Exploit Title: Gnuboard <= 4.33.02 PATH_INFO SQL INJECTION Vulnerability # Google Dork: inurl:gnuboard4/bbs/board.php # Date: 2011-2-14 # Author: flyh4t # Software Link: http://sir.co.kr/main/gnuboard4/ # Version: Gnuboard <= 4.33.02 # Tested on: linux+apache # CVE : CVE-2011-4066 Gnuboard <= 4.33.02 PATH_INFO SQL INJECTION Vulnerability --------------------------------- Bug found By Flyh4t & alpha.liu mail: flyh4t phpsec@hotmail.com alpha alpha@patching.net Site:bbs.wolvez.org --------------------------------- SIR GNUBoard(http://sir.co.kr) is a widely used bulletin board system of Korea. It is freely available for all platforms that supports PHP and MySQL. But we find a SQL INJECTION affects SIR GNUBoard version 4.33.02 The codes can be download here http://sir.co.kr/main/gnuboard4/ Here is the Vulnerability code in /bbs/tb.php -----------------------vul code------------------- //bbs/tb.php $arr = explode("/", $_SERVER[PATH_INFO]); //$_SERVER[PATH_INFO] is not affected by the magic_quotes_gpc set of php //we can inject arbitrary sql code include single quotes through $_SERVER[PATH_INFO] $bo_table = $arr[1]; $wr_id = $arr[2]; $to_token = $arr[3]; //we can pass arbitrary sql code to $bo_table $write_table = $g4[write_prefix] . $bo_table; // $write_table can be injected through $bo_table $sql = " select wr_id, ca_name, wr_email from $write_table where wr_id = '$wr_id' "; //here $write_table lead to sql injection,and no need of single quotes $wr = sql_fetch($sql, FALSE); if (!$wr[wr_id] || !($_POST[title] && $_POST[excerpt] && $_POST[url] && $_POST[blog_name])) { $tmp_dir = str_replace("/tb.php", "", $_SERVER[SCRIPT_NAME]); header("location:$tmp_dir/board.php?bo_table=$bo_table&wr_id=$wr_id"); exit; } -----------------------vul code end------------------- -----------------------poc------------------------ bbs/tb.php/[sql]/[sql] --------------------------------------------------

Products Mentioned

Configuraton 0

Sir>>Gnuboard >> Version To (including) 4.33.02

Sir>>Gnuboard >> Version 3.30

    Sir>>Gnuboard >> Version 3.31

      Sir>>Gnuboard >> Version 3.32

        Sir>>Gnuboard >> Version 3.33

          Sir>>Gnuboard >> Version 3.34

            Sir>>Gnuboard >> Version 3.35

              Sir>>Gnuboard >> Version 3.36

                Sir>>Gnuboard >> Version 3.37

                  Sir>>Gnuboard >> Version 3.38

                    Sir>>Gnuboard >> Version 3.39

                      Sir>>Gnuboard >> Version 3.40

                      Sir>>Gnuboard >> Version 4.31.03

                        Références

                        http://www.securityfocus.com/bid/50173
                        Tags : vdb-entry, x_refsource_BID
                        http://www.securitytracker.com/id?1026197
                        Tags : vdb-entry, x_refsource_SECTRACK
                        http://www.exploit-db.com/exploits/17992
                        Tags : exploit, x_refsource_EXPLOIT-DB