ID CVE-2006-6289
Summary Woltlab Burning Board (wBB) Lite 1.0.2 does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the wbb_userid parameter to the top-level URI. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in wBB Lite. Successful exploitation requires that "magic_quotes_gpc" is disabled, and that "register_globals" is enabled.
References
Vulnerable Configurations
  • cpe:2.3:a:woltlab:burning_board_lite:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:woltlab:burning_board_lite:1.0.2:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 17-10-2018 - 21:47)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
bid 21265
bugtraq 20061124 Wolflab Burning Board Lite 1.0.2 two sql injections
misc http://retrogod.altervista.org/wbblite_102_sql.html
Last major update 17-10-2018 - 21:47
Published 05-12-2006 - 11:28
Last modified 17-10-2018 - 21:47
Back to Top