Home / os / win7

[webapps / 0day] - Chipmunk Board 1.3 (index.php?forumID) SQ

Posted on 01 October 2010

<!DOCTYPE html PUBLIC '-//W3C//DTD XHTML 1.0 Strict//EN' 'http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd'><html xmlns='http://www.w3.org/1999/xhtml'><head><meta http-equiv='Content-Type' content='text/html; charset=utf-8' /><meta http-equiv='Content-Language' content='en' /><title>Chipmunk Board 1.3 (index.php?forumID) SQL Injection | Inj3ct0r - exploit database : vulnerability : 0day : shellcode</title><meta name='description' content='Chipmunk Board 1.3 (index.php?forumID) SQL Injection by Shamus in webapps / 0day | Inj3ct0r - exploit database : vulnerability : 0day : shellcode' /><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon' /><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss' /><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></head><body><pre>==================================================== Chipmunk Board 1.3 (index.php?forumID) SQL Injection ==================================================== # Exploit Title: Chipmunk Board (index.php?forumID) Remote SQL Injection Vulnerability # Date: October, 01 st 2010 # Author: Shamus # Software Link: http://www.chipmunk-scripts.com/board/board.zip # Version: Chipmunk Forums Version 1.3 # Tested on: windows # CVE : - ----------------------------------------------------------------------------------------- Chipmunk Board 1.3 (index.php?forumID) Remote SQL Injection Vulnerability ----------------------------------------------------------------------------------------- Author : Shamus Date : October, 02 nd 2010 [GMT +7] Location : Solo &amp;&amp; Jogjakarta, Indonesia Web : http://antijasakom.net/forum Critical Lvl : moderate Impact : Exposure of sensitive information Where : From Remote --------------------------------------------------------------------------- Affected software description: ~~~~~~~~~~~~~~~~~~~~~~~~~~ Application : Chipmunk Forums version : Chipmunk Forums Version 1.3 Vendor : chipmunk-scripts download : http://www.chipmunk-scripts.com/board/board.zip Description : Chipmunk Forum is a small yet flexible and fully featured forum system. It has unlimited categories and forums, staff only forums, read only forums, 4 levels of permissions. S milies, word filters, BBcode, Ip banning, e-mail ban from registration and much more. -------------------------------------------------------------------------- Vulnerability: ~~~~~~~~~~~~ A weakness has been discovered in Chipmunk Board on which version to 1.3. Where an attacker could exploit the gap that exists to obtain sensitive data within the database. These vulnerabilities were identified in the path &quot;index.php? forumID&quot; PoC/Exploit : ~~~~~~~~~~ injection type is integer, MSSQL with error http://www.sitetarget.com/board/index.php?forumID=1[Injection query] example of exploitation : http://www.chipmunk-scripts.com/board/index.php?forumID=25[Injection query] Dork: ~~~~~ Google : [think black, you can] Solution: ~~~~~ - N/A. Timeline: ~~~~~~~ - 01 - 10 - 2010 bug found - 01 - 10 - 2010 vendor contacted - 02 - 10 - 2010 advisory release # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-10-01]</pre></body></html>

 

TOP