发布时间 :2002-05-31 00:00:00
修订时间 :2017-07-10 21:29:11

[原文]admin.asp in AdMentor 2.11 allows remote attackers to bypass authentication and gain privileges via a SQL injection attack on the Login and Password arguments.


        AdMentor是Stefan Holmberg创建的免费ASP脚本收集程序。
        据报告,某些版本的AdMentor存在SQL Injection漏洞。在登录过程中远程用户输入的的内容被用来构造一个SQL查询语句,但是userid、pwd参数中单引号一类的特殊字符未被过滤掉。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20020221 AdMentor Login Flaw
(UNKNOWN)  BID  4152
(UNKNOWN)  XF  admentor-asp-gain-access(8245)

- 漏洞信息

危急 SQL注入
2002-05-31 00:00:00 2005-10-20 00:00:00
        AdMentor是Stefan Holmberg创建的免费ASP脚本收集程序。
        据报告,某些版本的AdMentor存在SQL Injection漏洞。在登录过程中远程用户输入的的内容被用来构造一个SQL查询语句,但是userid、pwd参数中单引号一类的特殊字符未被过滤掉。

- 公告与补丁

        Stefan Holmberg

- 漏洞信息

AdMentor admin.asp Multiple Field SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

AdMentor contains a flaw that may allow a remote attacker to carry out an SQL injection attack. The issue is due to the 'admin.asp' script not properly sanitizing user-supplied input to the 'Login' and 'Password' fields. This may allow a remote attacker to inject or manipulate SQL queries in the back-end database.

- 时间线

2002-02-21 Unknow
2002-02-21 Unknow

- 解决方案

Upgrade to version 2.22 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

AdMentor Remote SQL Injection Vulnerability
Input Validation Error 4152
Yes No
2002-02-21 12:00:00 2009-07-11 10:56:00
Published by Frank <>.

- 受影响的程序版本

Stefan Holmberg AdMentor 2.11

- 漏洞讨论

AdMentor is a free collection of ASP scripts created by Stefan Holmberg. AdMentor provides banner ad rotation functionality.

A SQL injection vulnerability has been reported in some versions of AdMentor. During the login process, user supplied input is used to contruct a SQL query. If special characters such as ' are included in the 'userid' and 'pwd' parameters passed to the script, the query may be subverted.

It has been demonstrated that this can be used to authenticate as any account within the AdMentor system. It may be possible to further corrupt the query, although this has not been verified.

Other versions of AdMentor may share this vulnerability. This has not been verified.

- 漏洞利用

This vulnerability can be exploited with a web browser.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考