CVE-2001-1379
CVSS7.5
发布时间 :2001-08-29 00:00:00
修订时间 :2016-11-28 14:06:19
NMCOS    

[原文]The PostgreSQL authentication modules (1) mod_auth_pgsql 0.9.5, and (2) mod_auth_pgsql_sys 0.9.4, allow remote attackers to bypass authentication and execute arbitrary SQL via a SQL injection attack on the user name.


[CNNVD]Apache mod_auth_pgsql远程SQL查询操作漏洞(CNNVD-200108-149)

        PostgreSQL认证模式(1)mod_auth_pgsql 0.9.5,(2)mod_auth_pgsql_sys 0.9.4存在漏洞。远程攻击者可以借助用户名上的SQL注入攻击绕过认证并执行任意SQL。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.5
cpe:/a:guiseppe_tanzilli_and_matthias_eckermann:mod_auth_pgsql:0.9.6

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1379
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1379
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200108-149
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:03.mod_auth_pgsql.asc
(UNKNOWN)  FREEBSD  FreeBSD-SA-02:03
http://archives.neohapsis.com/archives/vulnwatch/2001-q3/0040.html
(UNKNOWN)  VULNWATCH  20010829 [VulnWatch] RUS-CERT Advisory 2001-08:01
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000427
(UNKNOWN)  CONECTIVA  CLA-2001:427
http://marc.info/?l=bugtraq&m=99911895901812&w=2
(UNKNOWN)  BUGTRAQ  20010829 RUS-CERT Advisory 2001-08:01
http://rhn.redhat.com/errata/RHSA-2001-124.html
(UNKNOWN)  REDHAT  RHSA-2001:124
http://www.iss.net/security_center/static/7054.php
(VENDOR_ADVISORY)  XF  apache-postgresql-authentication-module(7054)
http://www.securityfocus.com/bid/3251
(UNKNOWN)  BID  3251
http://www.securityfocus.com/bid/3253
(UNKNOWN)  BID  3253
http://xforce.iss.net/xforce/xfdb/7059
(UNKNOWN)  XF  apache-postgresqlsys-authentication-module(7059)

- 漏洞信息

Apache mod_auth_pgsql远程SQL查询操作漏洞
高危 SQL注入
2001-08-29 00:00:00 2005-10-20 00:00:00
远程  
        PostgreSQL认证模式(1)mod_auth_pgsql 0.9.5,(2)mod_auth_pgsql_sys 0.9.4存在漏洞。远程攻击者可以借助用户名上的SQL注入攻击绕过认证并执行任意SQL。

- 公告与补丁

        Version 0.9.6 was still found to be prone to remote SQL query manipulation, so the vendor has released 0.9.9 to address this.
        Conectiva has also released upgrades.
        Guiseppe Tanzilli and Matthias Eckermann mod_auth_pgsql 0.9.5
        
        Guiseppe Tanzilli and Matthias Eckermann mod_auth_pgsql 0.9.6
        

- 漏洞信息

623
mod_auth_pgsql for Apache HTTP Server User Name SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-08-29 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.9.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Apache mod_auth_pgsql_sys Remote SQL Query Manipulation Vulnerability
Input Validation Error 3253
Yes No
2001-08-29 12:00:00 2009-07-11 07:56:00
This vulnerability was submitted to BugTraq in a RUS-CERT Advisory on August 29th, 2001.

- 受影响的程序版本

Guiseppe Tanzilli Matthias Eckermann and Victor G mod_auth_pgsql_sys 0.9.4
+ Apache Software Foundation Apache 1.3.20
+ Apache Software Foundation Apache 1.3.20
+ Apache Software Foundation Apache 1.3.19
+ Apache Software Foundation Apache 1.3.19
+ Apache Software Foundation Apache 1.3.18
+ Apache Software Foundation Apache 1.3.18
+ Apache Software Foundation Apache 1.3.17
+ Apache Software Foundation Apache 1.3.17
+ Apache Software Foundation Apache 1.3.14
+ Apache Software Foundation Apache 1.3.14
+ Apache Software Foundation Apache 1.3.12
+ Apache Software Foundation Apache 1.3.12
+ Apache Software Foundation Apache 1.3.11
+ Apache Software Foundation Apache 1.3.11
+ Apache Software Foundation Apache 1.3.9
+ Apache Software Foundation Apache 1.3.9
+ Apache Software Foundation Apache 1.3.4
+ Apache Software Foundation Apache 1.3.3
+ Apache Software Foundation Apache 1.3.3
+ Apache Software Foundation Apache 1.3.1
+ Apache Software Foundation Apache 1.3.1
+ Apache Software Foundation Apache 1.3
+ Apache Software Foundation Apache 1.3
+ Apache Software Foundation Apache 1.2.5
+ Apache Software Foundation Apache 1.2.5
+ Apache Software Foundation Apache 1.2
+ Apache Software Foundation Apache 1.2
+ Apache Software Foundation Apache 1.1.1
+ Apache Software Foundation Apache 1.1.1
+ Apache Software Foundation Apache 1.1
+ Apache Software Foundation Apache 1.1
+ Apache Software Foundation Apache 1.0.5
+ Apache Software Foundation Apache 1.0.5
+ Apache Software Foundation Apache 1.0.3
+ Apache Software Foundation Apache 1.0.3
+ Apache Software Foundation Apache 1.0.2
+ Apache Software Foundation Apache 1.0.2
+ Apache Software Foundation Apache 1.0
+ Apache Software Foundation Apache 1.0
+ Apache Software Foundation Apache 0.8.14
+ Apache Software Foundation Apache 0.8.14
+ Apache Software Foundation Apache 0.8.11
+ Apache Software Foundation Apache 0.8.11
- PostgreSQL PostgreSQL 6.5.3
- PostgreSQL PostgreSQL 6.5.3
- PostgreSQL PostgreSQL 6.3.2
- PostgreSQL PostgreSQL 6.3.2

- 漏洞讨论

'mod_auth_pgsql_sys' is an authentication module required by Apache server to make use of database-based authentication using PostGreSQL.

This authentication module for Apache is prone to a vulnerability which will allow SQL queries to be manipulated via a HTTP request. Data that is included in SQL query strings is not adequately sanitized. It may be possible for malicious users to modify the structure of SQL queries.

This issue allows the user to access resources that would normally be restricted, which may in turn provide an opportunity for the attacker to exploit other vulnerabilities that exist in the server.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站