[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Chipmunk Board 1.3 (index.php?forumID) SQL Injection

Author
Shamus
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-14234
Category
web applications
Date add
02-10-2010
Platform
php
====================================================
Chipmunk Board 1.3 (index.php?forumID) SQL Injection 
====================================================

# Exploit Title: Chipmunk Board (index.php?forumID) Remote SQL Injection Vulnerability
# Date: October, 01 st 2010
# Author: Shamus
# Software Link: http://www.chipmunk-scripts.com/board/board.zip
# Version: Chipmunk Forums Version 1.3
# Tested on: windows
# CVE : -
 
 
 
-----------------------------------------------------------------------------------------
Chipmunk Board 1.3 (index.php?forumID) Remote SQL Injection Vulnerability
-----------------------------------------------------------------------------------------
 
Author : Shamus
Date : October, 02 nd 2010 [GMT +7]
Location : Solo && Jogjakarta, Indonesia
Web : http://antijasakom.net/forum
Critical Lvl : moderate
Impact : Exposure of sensitive information
Where : From Remote
---------------------------------------------------------------------------
 
 
 
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~
 
Application : Chipmunk Forums
version : Chipmunk Forums Version 1.3
Vendor : chipmunk-scripts
download : http://www.chipmunk-scripts.com/board/board.zip
Description :
Chipmunk Forum is a small yet flexible and fully featured forum system.
It has unlimited categories and forums, staff only forums, read only forums, 4 levels of permissions. S
milies, word filters, BBcode, Ip banning, e-mail ban from registration and much more.
--------------------------------------------------------------------------
 
 
 
Vulnerability:
~~~~~~~~~~~~
A weakness has been discovered in Chipmunk Board on which version to 1.3.
Where an attacker could exploit the gap that exists to obtain sensitive data within the database.
These vulnerabilities were identified in the path "index.php? forumID"
 
PoC/Exploit :
~~~~~~~~~~
injection type is integer, MSSQL with error
 
http://www.sitetarget.com/board/index.php?forumID=1[Injection query]
 
example of exploitation :
http://www.chipmunk-scripts.com/board/index.php?forumID=25[Injection query]
 
 
 
Dork:
~~~~~
Google : [think black, you can]
 
Solution:
~~~~~
- N/A.
 
 
Timeline:
~~~~~~~
 
- 01 - 10 - 2010 bug found
- 01 - 10 - 2010 vendor contacted
- 02 - 10 - 2010 advisory release



#  0day.today [2024-12-23]  #