PunBB Profile.PHP SQL Injection Vulnerability
BID:13071
Info
PunBB Profile.PHP SQL Injection Vulnerability
| Bugtraq ID: | 13071 |
| Class: | Input Validation Error |
| CVE: |
CVE-2005-1051 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 08 2005 12:00AM |
| Updated: | Jul 12 2009 12:56PM |
| Credit: | The researcher responsible for discovering this issue is unknown at the moment. |
| Vulnerable: |
PunBB PunBB 1.2.4 PunBB PunBB 1.2.3 PunBB PunBB 1.2.2 PunBB PunBB 1.2.1 PunBB PunBB 1.1.5 PunBB PunBB 1.1.4 PunBB PunBB 1.1.3 PunBB PunBB 1.1.2 PunBB PunBB 1.1.1 PunBB PunBB 1.1 PunBB PunBB 1.0.1 PunBB PunBB 1.0 RC2 PunBB PunBB 1.0 RC1 PunBB PunBB 1.0 _beta3 PunBB PunBB 1.0 _beta2 PunBB PunBB 1.0 _beta1 PunBB PunBB 1.0 _alpha PunBB PunBB 1.0 |
| Not Vulnerable: |
PunBB PunBB 1.2.5 |
Discussion
PunBB Profile.PHP SQL Injection Vulnerability
PunBB is affected by a SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input through the 'profile.php' script before using it in a SQL query.
This issue can be successfully exploited to gain administrative access to a vulnerable forum.
PunBB 1.2.4 and prior versions are vulnerable.
PunBB is affected by a SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input through the 'profile.php' script before using it in a SQL query.
This issue can be successfully exploited to gain administrative access to a vulnerable forum.
PunBB 1.2.4 and prior versions are vulnerable.
Exploit / POC
PunBB Profile.PHP SQL Injection Vulnerability
No exploit is required.
The following proof of concept allowing the attacker to gain administrative access was provided by Hardened-PHP Project:
No exploit is required.
The following proof of concept allowing the attacker to gain administrative access was provided by Hardened-PHP Project:
Solution / Fix
PunBB Profile.PHP SQL Injection Vulnerability
Solution:
This issue has been addressed in PunBB 1.2.5.
PunBB PunBB 1.0 RC1
PunBB PunBB 1.0
PunBB PunBB 1.0 _beta2
PunBB PunBB 1.0 RC2
PunBB PunBB 1.0 _beta3
PunBB PunBB 1.0 _alpha
PunBB PunBB 1.0 _beta1
PunBB PunBB 1.0.1
PunBB PunBB 1.1
PunBB PunBB 1.1.1
PunBB PunBB 1.1.2
PunBB PunBB 1.1.3
PunBB PunBB 1.1.4
PunBB PunBB 1.1.5
PunBB PunBB 1.2.1
PunBB PunBB 1.2.2
PunBB PunBB 1.2.3
PunBB PunBB 1.2.4
Solution:
This issue has been addressed in PunBB 1.2.5.
PunBB PunBB 1.0 RC1
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.0
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.0 _beta2
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.0 RC2
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.0 _beta3
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.0 _alpha
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.0 _beta1
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.0.1
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.1
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.1.1
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.1.2
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.1.3
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.1.4
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.1.5
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.2.1
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.2.2
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.2.3
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
PunBB PunBB 1.2.4
-
PunBB punbb-1.2.5.zip
http://www.punbb.org/download/punbb-1.2.5.zip
References
PunBB Profile.PHP SQL Injection Vulnerability
References:
References: