[原文]SQL injection vulnerability in check_user.asp in multiple Web Wiz products including (1) Site News 3.06 and earlier, (2) Journal 1.0 and earlier, (3) Polls 3.06 and earlier, and (4) and Database Login 1.71 and earlier allows remote attackers to execute arbitrary SQL commands via the txtUserName parameter.
Web Wiz Multiple Products check_user.asp txtUserName Parameter SQL Injection
Remote / Network Access
Loss of Confidentiality,
Loss of Integrity
Web Wiz News, Web Wiz Journal, Web Wiz Polls and Web Wiz Database Login contain a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the check_user.asp script not properly sanitizing user-supplied input to the 'txtUserName' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.
Upgrade Web Wiz Site News to version 3.07 or higher, Web Wiz Journal to version 1.0.1 or higher, Web Wiz Polls to version 3.07 or higher and Web Wiz Database Login to version 1.72 as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.