CVE-2004-0323

HIGH7.5/ 10.0
Share:
Published: December 31, 2004 at 05:00 AM
Modified: April 3, 2025 at 01:03 AM
Source: cve@mitre.org

Vulnerability Description

Multiple SQL injection vulnerabilities in XMB 1.8 Final SP2 allow remote attackers to inject arbitrary SQL and gain privileges via the (1) ppp parameter in viewthread.php, (2) desc parameter in misc.php, (3) tpp parameter in forumdisplay.php, (4) ascdesc parameter in forumdisplay.php, or (5) the addon parameter in stats.php. NOTE: it has also been shown that item (3) is also in XMB 1.9 beta.

CVSS Metrics

Base Score
7.5
Severity
HIGH
Vector String
AV:N/AC:L/Au:N/C:P/I:P/A:P

Weaknesses (CWE)

NVD-CWE-Other
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

XMB 1.8 Final SP2 and 1.9 Beta are vulnerable to multiple SQL injection flaws, allowing attackers to execute arbitrary SQL commands. Successful exploitation grants attackers unauthorized access to the database, potentially leading to data breaches, account compromise, and complete system takeover. This vulnerability is easily exploitable remotely.

02 // Vulnerability Mechanism

Step 1: Identify Vulnerable Parameter: The attacker identifies the vulnerable parameters within the XMB application (e.g., ppp in viewthread.php).

Step 2: Craft Malicious Payload: The attacker crafts a malicious SQL injection payload designed to achieve a specific goal, such as retrieving sensitive data, creating a new administrative account, or executing commands on the server.

Step 3: Inject Payload: The attacker submits the crafted payload through the vulnerable parameter in a specially crafted HTTP request.

Step 4: Server-Side Execution: The XMB application receives the request and, due to the lack of input validation, incorporates the attacker's payload directly into an SQL query.

Step 5: Database Interaction: The database server executes the modified SQL query, including the attacker's malicious code.

Step 6: Data Exfiltration/Privilege Escalation: Depending on the payload, the attacker can then retrieve sensitive information from the database, modify data, or gain elevated privileges, potentially leading to complete system compromise.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation and sanitization of user-supplied parameters within several PHP scripts. Specifically, the scripts viewthread.php, misc.php, forumdisplay.php, and stats.php directly incorporate user-controlled input (e.g., ppp, desc, tpp, ascdesc, and addon) into SQL queries without proper escaping or filtering. This allows attackers to inject malicious SQL code, which is then executed by the database server. The root cause is a failure to implement parameterized queries or other safe methods for handling user input within SQL statements, leading to a classic SQL injection vulnerability. The lack of proper input validation allows attackers to manipulate the SQL queries, leading to unauthorized access and control over the database.

CVE-2004-0323 - HIGH Severity (7.5) | Free CVE Database | 4nuxd