CVE-2002-0536
CVSS7.5
发布时间 :2002-07-03 00:00:00
修订时间 :2008-09-05 16:28:16
NMCOE    

[原文]PHPGroupware 0.9.12 and earlier, when running with the magic_quotes_gpc feature disabled, allows remote attackers to compromise the database via a SQL injection attack.


[CNNVD]PHPGroupware登陆SQL命令可执行漏洞(CNNVD-200207-030)

        
        PHPGroupware是一款免费开放源代码的群件系统,由PHPGroupware项目组开发维护并通过PHP语言实现。
        PHPGroupware在登陆(login)字段中没有正确处理用户输入数据,导致远程攻击者可以在服务器上执行任意SQL命令。
        问题存在于登陆(login)字段没有对用户输入进行充分检查,攻击者可以在此字段输入中嵌入SQL命令,通过使用特殊字符('),导致通过登陆(login)字段传递SQL命令并在系统上执行。
        另外,此问题可以导致攻击者利用已存在的数据库进行攻击。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0536
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0536
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200207-030
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4424
(VENDOR_ADVISORY)  BID  4424
http://www.iss.net/security_center/static/8755.php
(VENDOR_ADVISORY)  XF  phpgroupware-sql-injection(8755)
http://archives.neohapsis.com/archives/bugtraq/2002-04/0036.html
(VENDOR_ADVISORY)  BUGTRAQ  20020403 SQL injection in PHPGroupware
http://www.osvdb.org/5153
(UNKNOWN)  OSVDB  5153
http://archives.neohapsis.com/archives/bugtraq/2002-04/0143.html
(UNKNOWN)  BUGTRAQ  20020411 Re: SQL injection in PHPGroupware

- 漏洞信息

PHPGroupware登陆SQL命令可执行漏洞
高危 未知
2002-07-03 00:00:00 2005-05-02 00:00:00
远程  
        
        PHPGroupware是一款免费开放源代码的群件系统,由PHPGroupware项目组开发维护并通过PHP语言实现。
        PHPGroupware在登陆(login)字段中没有正确处理用户输入数据,导致远程攻击者可以在服务器上执行任意SQL命令。
        问题存在于登陆(login)字段没有对用户输入进行充分检查,攻击者可以在此字段输入中嵌入SQL命令,通过使用特殊字符('),导致通过登陆(login)字段传递SQL命令并在系统上执行。
        另外,此问题可以导致攻击者利用已存在的数据库进行攻击。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用.htaccess文件限制只有合法用户能访问登陆(login)表单。
        厂商补丁:
        PHPGroupWare
        ------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.phpgroupware.org/

- 漏洞信息 (21365)

PHPGroupWare 0.9.13 Debian Package Configuration Vulnerability (EDBID:21365)
linux remote
2002-04-03 Verified
0 Matthias Jordan
N/A [点击下载]
source: http://www.securityfocus.com/bid/4424/info

PHPGroupWare is a freely available, open source groupware system written in PHP. It is distributed and maintained by the PHPGroupWare project.

Debian packages of PHPGroupWare ship with an insecure default configuration. The PHP magic_quotes_gpc directive of the PHPGroupWare apache.conf file is disabled by default in Debian packages. This may enable remote attackers to make SQL injection attacks via PHPGroupWare.

Under normal circumstances, PHPGroupWare installs with the PHP magic_quotes_gpc directive enabled, to restrict the possibility of SQL injection attacks.

Additionally, this issue may also enable an attacker to exploit vulnerabilities that may exist in the underlying database. 

fubar'; CREATE TABLE thistableshouldnotexist (a int); -- 		

- 漏洞信息

5153
phpGroupWare Login Page SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

phpGroupWare contains a flaw that will allow a remote attacker to inject arbitrary SQL code. The issue is triggered when accessing the login page and will allow a remote attacker to arbitrarily create and modify tables resulting in a loss of integrity.

- 时间线

2002-04-03 Unknow
2002-04-03 Unknow

- 解决方案

Upgrade to version 0.9.14 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站