Description
|
|
A new vulnerability was identified in MercuryBoard, which may be exploited by attackers to compromise a system. This SQL Injection flaw exists due to a missing input sanitising error when handling the "qu" parameter (func/post.php), which could be exploited to compromise a vulnerable system using specially crafted SQL commands.
Example :
http://vulnerable/mercuryboard/index.php?a=post&s=reply&t=1&qu=10000%20UNION%20SELECT%20user_password,user_name%20from%20mb_users%20where%20user_group%20=%201%20limit%201/*
|