Vulnerability Note VU#314347
phpBB does not adequately validate user input thereby allowing user to gain escalated privileges via manipulated SQL query
phpBB is an open-source bulletin board program. There exists a user input validation problem with regard to the parsing of the URL. An intruder can excute limited SQL queries and gain administrative privileges on the bulletin board.
phpBB has a user input validation problem that can lead to the execution of limited SQL queries and administrative privileges on the bulletin board. There is an algorithm (in auth.php) to remove backslash characters from the URL. Because the backslash charcters were removed, php variables may have unescaped quotes, allowing the attacker to pass these variables to an sql query in another file. For example, prefs.php is one file exploitable by this vulnerability. The intruder can register for an account on the bulletin board and then enter a specially crafted URL to exploit this vulnerability and gain administrative rights on the bulletin board.
An intruder can gain administrative privileges to the bulletin board.
The CERT/CC is currently unaware of a practical solution to this problem.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|PHPBB||Affected||17 Aug 2001||17 Sep 2001|
CVSS Metrics (Learn More)
This vulnerability was discovered by kill-9 <firstname.lastname@example.org>.
This document was written by Jason Rafail.
- CVE IDs: Unknown
- Date Public: 03 Aug 2001
- Date First Published: 17 Sep 2001
- Date Last Updated: 17 Sep 2001
- Severity Metric: 20.25
- Document Revision: 7
If you have feedback, comments, or additional information about this vulnerability, please send us email.