J-Security Center

Title: Koobi 'img_id' Parameter SQL Injection Vulnerability

Severity: HIGH


Koobi is a web-based message board implemented in PHP.

The application is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data to the 'img_id' parameter of the 'index.php' script when the 'p' parameter is set to 'gallery'.

A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

This issue affects the following:

Koobi 4.4 and 5.4
Koobi Pro 6.1

Other versions may also be vulnerable.

Affected Products:

  • dream4 Koobi 4.4
  • dream4 Koobi 5.4
  • dream4 Koobi Pro 6.1


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.