[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3FAF9901.7060300@michealcottingham.com>
Date: Mon, 10 Nov 2003 08:56:17 -0500
From: Micheal Cottingham <micheal@...healcottingham.com>
To: bugtraq@...urityfocus.com
Subject: Re: Fw: sql injection in phpbb
What's more, as is in the linked topic, is that there is no 2.0.7
>----- Original Message -----
>From: "Marius Kaase" <marius@...se.net>
>To: "jocanor jocanor" <jocanor2002@...mail.com>
>Cc: <bugtraq@...urityfocus.com>
>Sent: Saturday, November 08, 2003 2:39 PM
>Subject: Re: sql injection in phpbb
>
>
>jocanor jocanor wrote:
>
>
>
>>I found a vulnerability en phpbb 2.0.5 and prior, is probably also affect
>>
>>
>2.0.6
>
>
>>this bug don't affect to version 2.0.7
>>
>>phpbb have a list of registereds users, when you click on a memebr of this
>>
>>
>list, you are requesting data to the database
>
>
>>for example:
>>
>>http://www.example.com/forum/profile.php?mode=viewprofile&u=2
>>
>>this url show the information to the user with the uid = 2, the uid is a
>>
>>
>number assigned to users in phpbb.
>
>
>>but it isn't secure, because if you use this url, you can inject sql
>>
>>
>comands...
>
>
>>exploit:
>>
>>http://www.example.com/profile.php?mode=viewprofile&u='[sqlcode]
>>
>>where [sql code] represents the code may be injected.
>>
>>
>>
>
>Does not affect 2.0.6.
>
>This code prevents it:
>
>function get_userdata($user, $force_str = false)
>{
>global $db;
>
>if (intval($user) == 0 || $force_str)
>{
>$user = trim(htmlspecialchars($user));
>$user = substr(str_replace("\\'", "'", $user), 0, 25);
>$user = str_replace("'", "\\'", $user);
>}
>else
>{
>$user = intval($user);
>}
>
>(Taken from: http://www.phpbb.com/phpBB/viewtopic.php?p=848495)
>
>
>
Powered by blists - more mailing lists