BugTraq
Back to list
|
Post reply
Vikingboard 0.1b Multiple Vulnerabilities
Sep 08 2006 09:57AM
no-replay Hessamx net
================================================
:: Vikingboard 0.1b Multiple Vulnerabilities ::
================================================
Software : Vikingboard
Website : http://www.vikingboard.com/
Discover : Hessam-x / www.hessamx.net
I. Cross Site Scripting Vulnerabilities
-------------------------------------------------
Parameter "act" in "Help.php" & "search.php" and
parameter "p" in "report.php" are not properly sanitized
This can be used to post arbitrary HTML or web script code.
/help.php?act=[XSS]
/report.php?p=[xss]
II. SQL Injection Vulnerability
-------------------------------------------------
Parameter "s" in "topic.php" is not properly sanitized
before being used in SQL query.
This can be used make any SQL query by injecting arbitrary SQL code.
Attacker can be execute this url :
/topic.php?t=1&s=-1[Query]
================================================
Hessam Salehi .Hessamx[@]Hessamx.net
================================================
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
:: Vikingboard 0.1b Multiple Vulnerabilities ::
================================================
Software : Vikingboard
Website : http://www.vikingboard.com/
Discover : Hessam-x / www.hessamx.net
I. Cross Site Scripting Vulnerabilities
-------------------------------------------------
Parameter "act" in "Help.php" & "search.php" and
parameter "p" in "report.php" are not properly sanitized
This can be used to post arbitrary HTML or web script code.
/help.php?act=[XSS]
/report.php?p=[xss]
II. SQL Injection Vulnerability
-------------------------------------------------
Parameter "s" in "topic.php" is not properly sanitized
before being used in SQL query.
This can be used make any SQL query by injecting arbitrary SQL code.
Attacker can be execute this url :
/topic.php?t=1&s=-1[Query]
================================================
Hessam Salehi .Hessamx[@]Hessamx.net
================================================
[ reply ]