Chipmunk Board 1.3 remote SQL injection vulnerability

2010-10-03 / 2010-10-04
Credit: Shamus
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


Ogólna skala CVSS: 7.5/10
Znaczenie: 6.4/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Częściowy
Wpływ na dostępność: Częściowy

# Exploit Title: Chipmunk Board (index.php?forumID) Remote SQL Injection Vulnerability # Date: October, 01 st 2010 # Author: Shamus # Software Link: http://www.chipmunk-scripts.com/board/board.zip # Version: Chipmunk Forums Version 1.3 # Tested on: windows # CVE : - ----------------------------------------------------------------------------------------- Chipmunk Board 1.3 (index.php?forumID) Remote SQL Injection Vulnerability ----------------------------------------------------------------------------------------- Author : Shamus Date : October, 02 nd 2010 [GMT +7] Location : Solo && Jogjakarta, Indonesia Web : http://antijasakom.net/forum Critical Lvl : moderate Impact : Exposure of sensitive information Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~ Application : Chipmunk Forums version : Chipmunk Forums Version 1.3 Vendor : chipmunk-scripts download : http://www.chipmunk-scripts.com/board/board.zip Description : Chipmunk Forum is a small yet flexible and fully featured forum system. It has unlimited categories and forums, staff only forums, read only forums, 4 levels of permissions. S milies, word filters, BBcode, Ip banning, e-mail ban from registration and much more. -------------------------------------------------------------------------- Vulnerability: ~~~~~~~~~~~ A weakness has been discovered in Chipmunk Board on which version to 1.3. Where an attacker could exploit the gap that exists to obtain sensitive data within the database. These vulnerabilities were identified in the path "index.php? forumID" PoC/Exploit : ~~~~~~~~~ injection type is integer, MSSQL with error http://www.sitetarget.com/board/index.php?forumID=1[Injection query] example of exploitation : http://www.chipmunk-scripts.com/board/index.php?forumID=25[Injection query] Dork: ~~~~ Google : [think black, you can] Solution: ~~~~ - N/A. Timeline: ~~~~~~ - 01 - 10 - 2010 bug found - 01 - 10 - 2010 vendor contacted - 02 - 10 - 2010 advisory release --------------------------------------------------------------------------- Shoutz: ~~~~~~ oO0::::: Greetz and Thanks: :::::0Oo. Tuhan YME My Parents SPYRO_KiD K-159 lirva32 newbie_campuz And Also My LuvLy : ..::.E.Z.R (The deepest Love I'v ever had..).::.. in memorial : 1. Monique 2. Dewi S. 3. W. Devi Amelia 4. S. Anna oO0:::A hearthy handshake to: :::0Oo ~ Crack SKY Staff ~ Echo staff ~ antijasakom staff ~ jatimcrew staff ~ whitecyber staff ~ lumajangcrew staff ~ unix_dbuger, boys_rvn1609, jaqk, byz9991, bius, g4pt3k, anharku, wandi, 5yn_4ck, kiddies, bom2, untouch, antcode ~ arthemist, opt1lc, m_beben, gitulaw, luvrie, poniman_coy, ThePuzci, x-ace, newbie_z, petunia, jomblo.k, hourexs_paloer, cupucyber, kucinghitam, black_samuraixxx, ucrit_penyu, wendys182, cybermuttaqin ~ k3nz0, thomas_ipt2007, blackpaper, nakuragen, candra, dewa ~ whitehat, wenkhairu, Agoes_doubleb, diki, lumajangcrew a.k.a adwisatya a.k.a xyberbreaker, wahyu_antijasakom ~ Cruz3N, mywisdom,flyff666, gunslinger_, ketek, chaer.newbie, petimati, gonzhack, spykit, xtr0nic, N4ck0, assadotcom, Qrembiezs, d4y4x ~ All people in SMAN 3 ~ All members of spyrozone ~ All members of echo ~ All members of newhack ~ All members of jatimcrew ~ All members of Anti-Jasakom ~ All members of whitecyber ~ All members of Devilzc0de #e-c-h-o, #K-elektronik, #newhack, #Solohackerlink, #YF, #defacer, #manadocoding, #jatimcrew, #antijasakom, #whitecyber, #devilzc0de --------------------------------------------------------------------------- Contact: ~~~~~~~~ Shamus : Shamus@antijasakom.net Homepage: https://antijasakom.net/forum/viewtopic.php?f=38&t=666 -------------------------------- [ EOF ] ----------------------------------

Referencje:

http://xforce.iss.net/xforce/xfdb/62221
http://www.securityfocus.com/bid/43648
http://www.exploit-db.com/exploits/15175
http://packetstormsecurity.org/1010-exploits/chipmunkboard13-sql.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top