CVE-2004-1562
CVSS7.5
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 22:56:33
NMCOES    

[原文]SQL injection vulnerability in redir_url.php in w-Agora 4.1.6a allows remote attackers to execute arbitrary SQL commands via the key parameter.


[CNNVD]W-Agora多个远程输入验证漏洞(CNNVD-200412-424)

        w-Agora 4.1.6a版本中的redir_url.php存在SQL注入漏洞。远程攻击者可以借助key参数执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1562
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1562
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-424
(官方数据源) CNNVD

- 其它链接及资源

http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/027040.html
(VENDOR_ADVISORY)  FULLDISC  20040930 Multiple vulnerabilities in w-agora forum
http://marc.info/?l=bugtraq&m=109655691512298&w=2
(UNKNOWN)  BUGTRAQ  20040930 Multiple vulnerabilities in w-agora forum
http://securitytracker.com/id?1011463
(UNKNOWN)  SECTRACK  1011463
http://www.securityfocus.com/bid/11283
(UNKNOWN)  BID  11283
http://xforce.iss.net/xforce/xfdb/17557
(PATCH)  XF  wagora-redirurl-sql-injection(17557)

- 漏洞信息

W-Agora多个远程输入验证漏洞
高危 SQL注入
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        w-Agora 4.1.6a版本中的redir_url.php存在SQL注入漏洞。远程攻击者可以借助key参数执行任意SQL命令。

- 公告与补丁

        It is reported that CVS patches are available to address these issues. Please contact the vendor for more information. A link to the W-Agora CVS repository is available in Web references.

- 漏洞信息 (24648)

W-Agora 4.1.6 a redir_url.php key Parameter SQL Injection (EDBID:24648)
php webapps
2004-09-30 Verified
0 Alexander Antipov
N/A [点击下载]
source: http://www.securityfocus.com/bid/11283/info

Multiple vulnerabilities are reported to affect the application. These issues arise due to insufficient sanitization of user-supplied data. A remote attacker may leverage these vulnerabilities to carry out SQL injection, cross-site scripting, and HTTP response splitting attacks.

These issues were identified in W-Agora 4.1.6a, however, it is possible that other versions are also affected.

redir_url.php?bn=demos_links&key=[SQL]		

- 漏洞信息

10457
w-Agora redir_url.php key Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

W-Agora contains a flaw that will allow an attacker to inject arbitrary SQL code. The problem is that the "key" variable in the "redir_url.php" module is not verified properly and will allow an attacker to inject or manipulate SQL queries.

- 时间线

2004-09-29 Unknow
2004-09-29 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, W-Agora has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

W-Agora Multiple Remote Input Validation Vulnerabilities
Input Validation Error 11283
Yes No
2004-09-30 12:00:00 2009-07-12 07:06:00
Discovery is credited to Alexander Antipov <antipov@SecurityLab.ru>.

- 受影响的程序版本

W-Agora W-Agora 4.1.6 a

- 漏洞讨论

Multiple vulnerabilities are reported to affect the application. These issues arise due to insufficient sanitization of user-supplied data. A remote attacker may leverage these vulnerabilities to carry out SQL injection, cross-site scripting, and HTTP response splitting attacks.

These issues were identified in W-Agora 4.1.6a, however, it is possible that other versions are also affected.

- 漏洞利用

An exploit is not required.

The following proof of concept examples are available:

SQL injection:
redir_url.php?bn=demos_links&amp;key=[SQL]

Cross-site scripting:
download_thread.php?site=support&amp;bn=support_install&amp;thread=[XSS code here]

POST /login.php HTTP/1.1
Host: w-agora
Content-Type: application/x-www-form-urlencoded
Content-Length: 89
loginform=1&amp;redirect_url=1&amp;loginuser=[XSS code here]&amp;loginpassword=1


POST /forgot_password.php HTTP/1.1
Host: w-agora
Content-Type: application/x-www-form-urlencoded
Content-Length: 48
go=1&amp;userid=[XSS code here]

HTTP response splitting:
/subscribe_thread.php?site=support&amp;bn=support_in

stall&amp;thread=%0d%0aContent-Length:%200%0d%0a%0d%0a%20200%20OK%0d%0aConte
nt-Type:%20text/html%0d%0aContent-Length:%2034%0d%0a%0d%0a%3chtml%3eScan
ned%20by%20PTsecurity%3c/html%3e%0d%0a

- 解决方案

It is reported that CVS patches are available to address these issues. Please contact the vendor for more information. A link to the W-Agora CVS repository is available in Web references.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站