source: http://www.securityfocus.com/bid/19374/info XennoBB is prone to multiple SQL injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in an SQL query. A successful attack could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation. These issues affect version 2.1.0; earlier versions may also be vulnerable. Submitting the following as a POST request to profile.php is sufficient to exploit these issues and gain administrative privileges: form_sent=1&form[sex]=a&bday_day=1&bday_month=2&bday_year=", group_id=1, birthday="
Related ExploitsTrying to match CVEs (1): CVE-2006-4025
Trying to match OSVDBs (1): 27826
Other Possible E-DB Search Terms: XennoBB 2.1, XennoBB
|2006-08-09||XennoBB 1.0.5/1.0.6/2.1/2.2 - 'profile.php' Directory Traversal||Chris Boulton|
|2006-08-19||XennoBB 1.0.x/2.2 - Icon_Topic SQL Injection||Chris Boulton|