XennoBB 2.1 - 'profile.php' Multiple SQL Injections

Author: Chris Boulton
type: webapps
platform: php
port: 
date_added: 2006-08-07  
date_updated: 2013-09-17  
verified: 1  
codes: CVE-2006-4025;OSVDB-27826  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 28347.txt  
source: https://www.securityfocus.com/bid/19374/info

XennoBB is prone to multiple SQL injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query.

A successful attack could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

These issues affect version 2.1.0; earlier versions may also be vulnerable.

Submitting the following as a POST request to profile.php is sufficient to exploit these issues and gain administrative privileges:

form_sent=1&form[sex]=a&bday_day=1&bday_month=2&bday_year=", group_id=1, birthday="