Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Forum/Board/Portal)  >   L-Forum Vendors:
L-Forum Bulletin Board Input Validation Bug in 'search.php' Allows Remote Users to Inject SQL Commands
SecurityTracker Alert ID:  1005044
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Aug 14 2002
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  

Description:   An input validation vulnerability was reported in the L-Forum software. A remote user could execute arbitrary SQL commands on the underlying database server.

It is reported that the 'search.php' code does not properly filter or escape user-supplied SQL data. A remote user can submit a specially crafted search to execute arbitrary SQL commands on the system.

A demonstration exploit for Postgres is provided:


A demonstration exploit for MySQL is provided:


Impact:   A remote user can execute arbitrary SQL commands on the underlying database server.
Solution:   The author of the report has submitted a patch, available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  [VulnWatch] L-Forum Vulnerability - SQL Injection

I have discovered an SQL injection flaw in L-Forum which has
a recent record (upload spoofing/XSS by Ulf) of security bugs.

The problem this time is search.php.  It doesn't properly escape
the SQL data passed in by the user in the search member.  I
have provided a SourceForge patch for this vulnerability.  I
have shown URLs that exploit this:





I've patched this on SourceForge:

"The reason the mainstream is thought
of as a stream is because it is
so shallow."
                     - Author Unknown


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC