Multiple SQL injection vulnerabilities in PBBoard 2.1.4 allow remote attackers to execute arbitrary SQL commands via the (1) username parameter to the send page, (2) email parameter to the forget page, (3) password parameter to the forum_archive page, (4) section parameter to the management page, (5) section_id parameter to the managementreply page, (6) member_id parameter to the new_password page, or (7) subjectid parameter to the tags page to index.php.
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Link | Tags |
---|---|
https://www.htbridge.com/advisory/HTB23101 | exploit |
http://www.pbboard.com/forums/t10353.html | vendor advisory url repurposed |
http://www.securityfocus.com/bid/54916 | vdb entry exploit |
http://www.pbboard.com/forums/t10352.html | url repurposed |
http://osvdb.org/84480 | vdb entry |
http://secunia.com/advisories/50153 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77501 | vdb entry |