Novaboard Multiple Vulnerabilities


Recommended Posts

NovaBoard Multiple Vulnerabilities

Secunia Advisory: SA33966 Release Date: 2009-02-17

Moderately critical

Description:

brain[pillow] has discovered some vulnerabilities and a security issue in NovaBoard, which can be exploited by malicious people to conduct SQL injection attacks, disclose sensitive information, and bypass certain security restrictions.

1) Input passed to the "topic" parameter in index.php (when "page" is set to "search" and "pf" is set to "1") is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

2) Input passed to the "forum" parameter in index.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

3) Input passed to the "nova_name" cookie parameter in header.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

4) Input passed to the "nova_lang" cookie parameter in upload.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.

Successful exploitation of vulnerabilities #2 and #4 require that "magic_quotes_gpc" is disabled.

5) The application does not properly restrict access to the uploads/uploader.php script. This can be exploited to upload files to the web server by posting to the file directly.

These vulnerabilities and security issue are confirmed in version 1.0.0. Other versions may also be affected.

Secunia Advisories: http://secunia.com/advisories/33966/

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...