2014-06-23, 04:05 PM
HI guys,
I have been getting some SQL in jection and and I did a scan using ScanServer and it states that some of mybb code is insecure. Now I haven't modified any of the mybb code and this is from the lastest mybb. Here is what they are showing.
Not sure what to do here but it seems it is VERY unsecure as this is a high security bulletin. Ideas?
I have been getting some SQL in jection and and I did a scan using ScanServer and it states that some of mybb code is insecure. Now I haven't modified any of the mybb code and this is from the lastest mybb. Here is what they are showing.
We discovered vulnerabilities in the scripts listed below. Next to each script, there is a description of the type of attack that is possible, and the way to recreate the attack. If the attack is a simple HTTP GET request, you can usually paste it into your browser to see how it works. If it's a POST attack, the parameters for the POST request will be listed in square parenthesis.
SQL Injection
URL: http://**********.***/***/showthread.php?mode=threaded&tid=5522&pid=52479
Affected Parameter: mode
Vector Used: (VALUE
Pattern found: error in your SQL syntax
Complete Attack: http://**********.***/***/showthread.php?mode=(threaded&tid=5522&pid=52479
Show Test Sample
Recommended Solution:
* SQL Injection:
Use stored procedures to prevent attackers from altering the queries, and filter user input to discard invalid characters such as '
* Cross Site Scripting:
Filter user input to discard characters such as < and >. Make sure your server does not display error messages that contain input received from the user.
* Source Disclosure:
Make sure all debugging information is turned off from production servers. Scripts should be configured to be executables only, with no ability for a user to view them.
* Non-SSL login:
All login pages should be SSL protected (e.g. have an https:// link). When using non-SSL protected pages eavesdroppers might be able to capture usernames and passwords
* Sensitive information sent over non-encrypted page:
Make sure all sensitive information is sent over SSL-protected pages.
Impact:
Attackers can take control over your database, and in some cases over the operating system (using master..xp_cmdshell, CREATE LIBRARY, etc).
Not sure what to do here but it seems it is VERY unsecure as this is a high security bulletin. Ideas?