CVE-2001-1090
CVSS7.5
发布时间 :2001-09-10 00:00:00
修订时间 :2008-09-05 16:25:39
NMCOS    

[原文]nss_postgresql 0.6.1 and before allows a remote attacker to execute arbitrary SQL queries by inserting SQL code into an HTTP request.


[CNNVD]NSS NSS_PostGreSQL Remote SQL查询操作漏洞(CNNVD-200109-029)

        nss_postgresql 0.6.1及其早期版本存在漏洞。远程攻击者可以通过向HTTP请求注入SQL代码执行任意SQL查询。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1090
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1090
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200109-029
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/7111.php
(VENDOR_ADVISORY)  XF  postgresql-nss-authentication-modules(7111)
http://www.securityfocus.com/archive/1/213331
(VENDOR_ADVISORY)  BUGTRAQ  20010910 RUS-CERT Advisory 2001-09:01
http://www.securityfocus.com/bid/3315
(VENDOR_ADVISORY)  BID  3315

- 漏洞信息

NSS NSS_PostGreSQL Remote SQL查询操作漏洞
高危 输入验证
2001-09-10 00:00:00 2005-10-20 00:00:00
远程  
        nss_postgresql 0.6.1及其早期版本存在漏洞。远程攻击者可以通过向HTTP请求注入SQL代码执行任意SQL查询。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息

9502
nss_postgresql HTTP Request SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-09-10 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

NSS NSS_PostGreSQL Remote SQL Query Manipulation Vulnerability
Input Validation Error 3315
Yes No
2001-09-10 12:00:00 2009-07-11 07:56:00
This vulnerability was submitted to BugTraq in a RUS-CERT Advisory on September 10th, 2001.

- 受影响的程序版本

Alessandro Gardich nss_postgresql 0.6.1
- PostgreSQL PostgreSQL 6.5.3
- PostgreSQL PostgreSQL 6.3.2
- PostgreSQL PostgreSQL 6.3.2

- 漏洞讨论

NSS(Name Service Switch) can use PostgreSQL as a back-end for database-based authentication.

The NSS database module 'nss_postgresql' is prone to a vulnerability which will allow SQL queries to be manipulated via any request which requires PAM authentication, regardless of the protocol used. Data that is included in SQL query strings is not adequately sanitized. It may be possible for malicious users to modify the structure of SQL queries.

It is believed that the attacker would need an interactive account on the vulnerable host to exploit this issue. Attacks will be executed on the database server as the database user that is making the query.

This issue allows the user to access resources that would normally be restricted, which may in turn provide an opportunity for the attacker to exploit other vulnerabilities that exist in the server.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站