[VIM] Source verify and clarification of old bookmark4u SQL injection

Steven M. Christey coley at mitre.org
Thu Feb 22 00:30:19 EST 2007

Ref: FULLDISC:20060420 Sql Injection in BookMark4u
URL: http://marc.theaimsgroup.com/?l=full-disclosure&m=114555163911635&w=2

1) This is abandonware.  Last version was in 2003 and site says "This
   Project will NOT be updated ANY MORE."  See:

2) Some VDB's mention the "mode" parameter being affected, but this
   appears erroneous.  Only mentions of $mode in config.php are:

        $mode   = $HTTP_POST_VARS[mode];
        if ($mode == 'sqlexec') {

3) sqlcmd vector verified by source inspection:

         $sqlcmd = $HTTP_POST_VARS[sqlcmd];
   if ($mode == 'sqlexec') {
     if (get_magic_quotes_gpc()) {
       $sqlcmd = ereg_replace("\\\\", "", $sqlcmd);
     $qry = ereg_replace("%NL%", "\n", $sqlcmd); # decode newline(\n) chars
     $qry_list = explode(";", $qry); # split multiple queries
     for ($i = 0; $i < sizeof($qry_list); $i++) {
       $qry_one = trim($qry_list[$i]);
       if (!$qry_one) continue;

   You know the rest.  Bill H will no doubt love the "%NL%" touch.

   At first glance, this didn't seem to require authentication or
   authorization, but I didn't look too close.

4) As might be expected for ancient PHP code, be careful when you look
   at the source, or you might step in some RFI.

- Steve

More information about the VIM mailing list