lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <3FAD4685.2040907@kaase.net> Date: Sat, 08 Nov 2003 20:39:49 +0100 From: Marius Kaase <marius@...se.net> To: jocanor jocanor <jocanor2002@...mail.com> Cc: bugtraq@...urityfocus.com Subject: Re: sql injection in phpbb jocanor jocanor wrote: > > I found a vulnerability en phpbb 2.0.5 and prior, is probably also affect 2.0.6 > > this bug don't affect to version 2.0.7 > > phpbb have a list of registereds users, when you click on a memebr of this list, you are requesting data to the database > > for example: > > http://www.example.com/forum/profile.php?mode=viewprofile&u=2 > > this url show the information to the user with the uid = 2, the uid is a number assigned to users in phpbb. > > but it isn't secure, because if you use this url, you can inject sql comands... > > exploit: > > http://www.example.com/profile.php?mode=viewprofile&u='[sqlcode] > > where [sql code] represents the code may be injected. > Does not affect 2.0.6. This code prevents it: function get_userdata($user, $force_str = false) { global $db; if (intval($user) == 0 || $force_str) { $user = trim(htmlspecialchars($user)); $user = substr(str_replace("\\'", "'", $user), 0, 25); $user = str_replace("'", "\\'", $user); } else { $user = intval($user); } (Taken from: http://www.phpbb.com/phpBB/viewtopic.php?p=848495) -- Kind Regards Marius Kaase "If the Phone Doesn't Ring, It's Me"
Powered by blists - more mailing lists