Vulnerability Note VU#314347

phpBB does not adequately validate user input thereby allowing user to gain escalated privileges via manipulated SQL query

Original Release date: 17 Sep 2001 | Last revised: 17 Sep 2001

Overview

phpBB is an open-source bulletin board program. There exists a user input validation problem with regard to the parsing of the URL. An intruder can excute limited SQL queries and gain administrative privileges on the bulletin board.

Description

phpBB has a user input validation problem that can lead to the execution of limited SQL queries and administrative privileges on the bulletin board. There is an algorithm (in auth.php) to remove backslash characters from the URL. Because the backslash charcters were removed, php variables may have unescaped quotes, allowing the attacker to pass these variables to an sql query in another file. For example, prefs.php is one file exploitable by this vulnerability. The intruder can register for an account on the bulletin board and then enter a specially crafted URL to exploit this vulnerability and gain administrative rights on the bulletin board.

Impact

An intruder can gain administrative privileges to the bulletin board.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
PHPBBAffected17 Aug 200117 Sep 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was discovered by kill-9 <kill-9@modernhackers.com>.

This document was written by Jason Rafail.

Other Information

  • CVE IDs: Unknown
  • Date Public: 03 Aug 2001
  • Date First Published: 17 Sep 2001
  • Date Last Updated: 17 Sep 2001
  • Severity Metric: 20.25
  • Document Revision: 7

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.