Description
Multiple SQL injection vulnerabilities in ajaxserver.php in NextBBS 0.6 allow remote attackers to execute arbitrary SQL commands via the (1) curstr parameter in the findUsers function, (2) id parameter in the isIdAvailable function, or (3) username parameter in the getGreetings function.
Exploits (1)
References (7)
Core 7
Core References
Exploit mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/03/30/2
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/52728
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-03/0135.html
Exploit x_refsource_misc
http://www.waraxe.us/advisory-80.html
Exploit, Third Party Advisory x_refsource_misc
http://packetstormsecurity.org/files/111250/NextBBS-0.6.0-Authentication-Bypass-SQL-Injection-XSS.html
Exploit mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2012/03/29/8
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/80637
Scores
EPSS
0.0282
EPSS Percentile
86.2%
Details
CWE
CWE-89
Status
published
Products (1)
nextbbs/nextbbs
0.6
Published
Oct 01, 2012
Tracked Since
Feb 18, 2026