Peaches Posted February 18, 2009 Report Share Posted February 18, 2009 NovaBoard Multiple Vulnerabilities Secunia Advisory: SA33966 Release Date: 2009-02-17 Moderately critical Description: brain[pillow] has discovered some vulnerabilities and a security issue in NovaBoard, which can be exploited by malicious people to conduct SQL injection attacks, disclose sensitive information, and bypass certain security restrictions. 1) Input passed to the "topic" parameter in index.php (when "page" is set to "search" and "pf" is set to "1") is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 2) Input passed to the "forum" parameter in index.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 3) Input passed to the "nova_name" cookie parameter in header.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 4) Input passed to the "nova_lang" cookie parameter in upload.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes. Successful exploitation of vulnerabilities #2 and #4 require that "magic_quotes_gpc" is disabled. 5) The application does not properly restrict access to the uploads/uploader.php script. This can be exploited to upload files to the web server by posting to the file directly. These vulnerabilities and security issue are confirmed in version 1.0.0. Other versions may also be affected. Secunia Advisories: http://secunia.com/advisories/33966/ Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.