发布时间 :2005-12-22 20:03:00
修订时间 :2017-07-19 21:29:17

[原文]** DISPUTED ** SQL injection vulnerability in WebDB 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified search parameters, possibly Search0. NOTE: the vendor has disputed this issue, saying that "WebDB is a generic online database system used by many of the clients of Lois Software. The flaw that was identified was some code that was added for a client to do some testing of his system and only certain safe commands were allowed. This code has now been removed and it is not now possible to use SQL queries as part of the query string. No installation or patch is required All clients use a common code library and have their own front end and databases and connections. So as soon as a change / upgrade / enhancement is made to the code, all users of the software begin to use the latest changes immediately." Since the issue appeared in a custom web site and no action is required on the part of customers, this issue should not be included in CVE.

[CNNVD]Lois Software WebDB搜索模块SQL注入漏洞(CNNVD-200512-541)

        ** 争议 ** WebDB 1.1及更早版本存在SQL注入漏洞,远程攻击者可以通过未明搜索参数,可能是Search0,来执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-89 [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  16038
(UNKNOWN)  XF  webdb-search-module-sql-injection(23840)

- 漏洞信息

Lois Software WebDB搜索模块SQL注入漏洞
高危 SQL注入
2005-12-22 00:00:00 2006-06-06 00:00:00
        ** 争议 ** WebDB 1.1及更早版本存在SQL注入漏洞,远程攻击者可以通过未明搜索参数,可能是Search0,来执行任意SQL命令。

- 公告与补丁


- 漏洞信息

WebDB Search Module search Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

WebDB has been reported to contain a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the search module not properly sanitizing user-supplied input to the 'search' variable. However, subsequent testing and vendor communication has revealed the affected code resides on Lois Software's computers, and is part of a managed service. The affected code was added for one client to perform additional testing and only allowed safe commands. The code was removed on or before March 7, 2006. Site specific vulnerabilities are not included in OSVDB, but due to the distribution of this information and the lack of clarification, this entry is being kept to help make the additional details public.

- 时间线

2005-12-22 Unknow
Unknow Unknow

- 解决方案

The vulnerability reported is site specific, only allowed specific commands to be executed, and has already been fixed by the vendor. No solution required.

- 相关参考

- 漏洞作者