BugTraq
Instaboard 1.3 SQL Injection Apr 14 2003 04:34PM
Jim Dew (jdew cleannorth org)
Affected Product: NetPleasure's Instaboard 1.3
www.netpleasure.com/instaboard/

Venerability: Multiple SQL Injection Vunerabilities.

http://server/instaboard/index.cfm?frmid=1%20AND%20u.userid%20IN%20(sele
ct%20userid%20from%20users)
http://server/instaboard/index.cfm?frmid=1&tpcid=1%20SQL
http://server/instaboard/index.cfm?frmid=1%20SQL&tpcid=1
http://server/instaboard/index.cfm?pr=replymsg&frmid=1&tpcid=1%20SQL&msg
id=11
http://server/instaboard/index.cfm?pr=replymsg&frmid=1&tpcid=1&msgid=11%
20SQL
http://server/instaboard/index.cfm?catid=1%20SQL

Notification:
Messages were posted on the Instaboard demo forum, in the "Instaboard 1.3
Troubleshooting and Problems" area, on April 02 2003. As of yet, there has
been no reply publicly or privately from thei author. Author emailed at
instaboard (at) netpleasure (dot) com [email concealed] on Tue, 8 Apr 2003 16:06:19 -0400

Proposed Solution:
If you have the licensed version of the product, protect the numerical
values within the CFQUERY tags:

for example:
In queries/oraclen/qry_GetOriginalMessage.cfm
change
WHERE m.tpcid = #tpcid#
AND m.userid = u.userid
AND m.msgid = #msgid#

to

WHERE m.tpcid = #VAL(tpcid)#
AND m.userid = u.userid
AND m.msgid = #VAL(msgid)#

--
"Most moms teach their daughters how to run a house, but you? You teach
yours the fine art of mass destruction."
- Nabs - Goodbye is not forever

perl -le '$_="6110>374086;2064208213:90<307;55";tr[0->][ LEOR!AUBGNSTY];print'

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus