MyBB < 1.04 misc.php SQLi

high Nessus Plugin ID 20930

Synopsis

The remote web server hosts a PHP application that is affected by a SQL injection vulnerability.

Description

The version of MyBB installed on the remote host is affected by a SQL injection vulnerability due to improper sanitization of user-supplied input to the comma variable via the 'comma' parameter in a cookie. If PHP's 'register_globals' setting is enabled, a remote, unauthenticated attacker can exploit this issue to manipulate SQL queries, resulting in the disclosure of sensitive information and modification of data.

Note that the application is also affected by additional SQL injection vulnerabilities and multiple cross-site scripting vulnerabilities due to insufficient validation of user-supplied input. However, Nessus has not tested for these issues.

Solution

Upgrade to MyBB version 1.04 or later.

See Also

https://www.securityfocus.com/archive/1/424942/30/0/threaded

https://community.mybb.com/showthread.php?tid=6777

Plugin Details

Severity: High

ID: 20930

File Name: mybb_104.nasl

Version: 1.22

Type: remote

Family: CGI abuses

Published: 2/16/2006

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:mybb:mybb

Required KB Items: www/PHP, installed_sw/MyBB

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2/15/2006

Vulnerability Publication Date: 2/15/2006

Reference Information

CVE: CVE-2006-0959

BID: 16631

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990