CVE-2008-1298 |
|
发布时间 :2008-03-12 13:44:00 | ||
修订时间 :2008-09-05 17:37:22 | ||||
NMCO |
[原文]SQL injection vulnerability in Hadith module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the cat parameter in a viewcat action to modules.php.
[CNNVD]PHP-Nuke Hadith模块 SQL注入漏洞(CNNVD-200803-190)
PHP-Nuke Hadith模块存在SQL注入漏洞。远程攻击者通过一个viewcat参数中的cat参数到达modules.php来执行任意SQL命令。
–
CVSS (基础分值)
CVSS分值: | 7.5 | [严重(HIGH)] |
机密性影响: | PARTIAL | [很可能造成信息泄露] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-89 | [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)] |
–
CPE (受影响的平台与产品)
cpe:/a:kyantonius:hadith_module | |
cpe:/a:php-nuke:hadith_module |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://www.securityfocus.com/bid/28171 (UNKNOWN) BID 28171 |
http://www.securityfocus.com/archive/1/archive/1/489323/100/0/threaded (UNKNOWN) BUGTRAQ 20080308 PHP-Nuke SQL injection Module “Hadith” [cat] |
http://www.rbt-4.net/forum/viewthread.php?forum_id=51&thread_id=3078 (UNKNOWN) MISC http://www.rbt-4.net/forum/viewthread.php?forum_id=51&thread_id=3078 |
http://secunia.com/advisories/29322 (VENDOR_ADVISORY) SECUNIA 29322 |
http://securityreason.com/securityalert/3730 (UNKNOWN) SREASON 3730 |
–
漏洞信息
PHP-Nuke Hadith模块 SQL注入漏洞 | |
高危 | SQL注入 |
2008-03-12 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
PHP-Nuke Hadith模块存在SQL注入漏洞。远程攻击者通过一个viewcat参数中的cat参数到达modules.php来执行任意SQL命令。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.phpnuke.org/ |
–
漏洞信息
42728 |
|
Hadith Module for PHP-Nuke modules.php cat Parameter SQL Injection | |
Remote / Network Access |
Information Disclosure, Input Manipulation |
Loss of Confidentiality, Loss of Integrity |
Solution Unknown |
Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
Hadith Module contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'modules.php' script not properly sanitizing user-supplied input to the 'cat' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
–
时间线
2008-03-11 |
Unknow |
2008-03-11 | Unknow |
–
解决方案
Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Make sure the $_GET['cat'] is numerical. |
–
相关参考
|