CVE-2002-2176
CVSS10.0
发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:32:31
NMCOE    

[原文]SQL injection vulnerability in Gender MOD 1.1.3 allows remote attackers to gain administrative access via the user_level parameter in the User Profile page.


[CNNVD]phpBB2 Gender Mod远程可插入SQL命令漏洞(CNNVD-200212-587)

        
        phpBB2是一款由PHP编写的WEB论坛应用程序,支持多种数据库系统,可使用在多种Unix和Linux操作系统下。
        phpBB2中的Gender Mod对用户的输入缺少正确的检查,远程攻击者可以利用这个漏洞进行SQL命令插入攻击。
        Gender Mod是phpBB2发布的修改器,可以用于修改用户档案等内容,Gender Mod对Post的值没有进行充分检查,可以增加一些SQL字段到UPDATE sql命令中,远程攻击者可以插入恶意SQL查询使更改UPDATE正常操作,可导致获得phpBB2管理员权限。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:phpbb_group:phpbb:2.0.0
cpe:/a:phpbb_group:phpbb:2.0.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2176
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-2176
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-587
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5342
(VENDOR_ADVISORY)  BID  5342
http://www.iss.net/security_center/static/9692.php
(VENDOR_ADVISORY)  XF  phpbb-gendermod-admin-privileges(9692)
http://online.securityfocus.com/archive/1/284691
(UNKNOWN)  BUGTRAQ  20020727 phpBB/gender mod allows get admin privilege, exploit/patch

- 漏洞信息

phpBB2 Gender Mod远程可插入SQL命令漏洞
危急 输入验证
2002-12-31 00:00:00 2006-03-01 00:00:00
远程  
        
        phpBB2是一款由PHP编写的WEB论坛应用程序,支持多种数据库系统,可使用在多种Unix和Linux操作系统下。
        phpBB2中的Gender Mod对用户的输入缺少正确的检查,远程攻击者可以利用这个漏洞进行SQL命令插入攻击。
        Gender Mod是phpBB2发布的修改器,可以用于修改用户档案等内容,Gender Mod对Post的值没有进行充分检查,可以增加一些SQL字段到UPDATE sql命令中,远程攻击者可以插入恶意SQL查询使更改UPDATE正常操作,可导致获得phpBB2管理员权限。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 打开forumroot/includes/usercp_register.php,查找如下代码:
        $gender = ( isset($HTTP_POST_VARS['gender']) ) ? $HTTP_POST_VARS ['gender'] : 0;
        使用如下代码更改:
        $gender = ( isset($HTTP_POST_VARS['gender']) ) ? intval ($HTTP_POST_VARS['gender']) : 0;
        厂商补丁:
        phpBB Group
        -----------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.phpbb.com/mods/downloads/index.php?sid=794802679&t=sub_pages&cat=6

- 漏洞信息 (21660)

phpBB2 Gender Mod 1.1.3 Remote SQL Injection Vulnerability (EDBID:21660)
php webapps
2002-07-29 Verified
0 langtuhaohoa caothuvolam
N/A [点击下载]
source: http://www.securityfocus.com/bid/5342/info

phpBB2 is an open-source web forum application that is written in PHP and backended by a number of database products. It will run on most Unix and Linux variants, as well as Microsoft Windows operating systems.

Gender Mod is a modification for phpBB2 which allows the association of a gender with a given user profile. A SQL injection vulnerability has been reported in this mod. A remote user may subvert the SQL statement used to update their user profile, possibly gaining administrative access to the system. 

"0, user_level = 1 " 		

- 漏洞信息

4279
phpBB Gender Mod profile.php gender Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

phpBB contains a flaw that will allow an attacker to inject arbitrary SQL code. The problem is that the "gender" variable in the "profile.php" module is not verified properly and will allow an attacker to inject or manipulate SQL queries.

- 时间线

2002-07-22 Unknow
2002-07-22 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, the vulnerability reporter has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站