发布时间 :2005-05-02 00:00:00
修订时间 :2017-07-10 21:32:15

[原文]SQL injection vulnerability in imageview.php for SGallery 1.01 allows remote attackers to execute arbitrary SQL commands via the (1) idalbum or (2) idimage parameters.

[CNNVD]SGallery Module For PHPNuke SQL注入漏洞(CNNVD-200505-658)

        SGallery 1.01的imageview.php存在SQL注入漏洞,远程攻击者可以通过(1)idalbum或(2)idimage参数来执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050112 [waraxe-2005-SA#039] - Critical Sql Injection in Sgallery module for PhpNuke
(UNKNOWN)  XF  sgallery-imageview-sql-injection(18876)

- 漏洞信息

SGallery Module For PHPNuke SQL注入漏洞
高危 SQL注入
2005-05-02 00:00:00 2006-08-24 00:00:00
        SGallery 1.01的imageview.php存在SQL注入漏洞,远程攻击者可以通过(1)idalbum或(2)idimage参数来执行任意SQL命令。

- 公告与补丁


- 漏洞信息

PHP-Nuke Sgallery imageview.php Multiple Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-01-12 2004-11-16
2005-01-12 Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SGallery Module For PHPNuke SQL Injection Vulnerability
Input Validation Error 12249
Yes No
2005-01-12 12:00:00 2009-07-12 09:27:00
Discovery is credited to Janek Vind <>.

- 受影响的程序版本

SGallery SGallery 1.0 1

- 漏洞讨论

SGallery is reported prone to SQL injection attacks. An attacker may leverage this issue to manipulate SQL query strings and potentially carry out arbitrary database queries. This may facilitate the disclosure or corruption of sensitive database information.

SGallery 1.01 is reported vulnerable to this issue.

- 漏洞利用

An exploit is not required.

The following proof of concept example is available:**/UNION/**/SELECT/**/pwd/**/FROM/**/nuke_authors/**/WHERE/**/radminsuper=1

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考