发布时间 :2005-12-31 00:00:00
修订时间 :2017-07-19 21:29:21

[原文]SQL injection vulnerability in PHlyMail 3.02.01 allows remote attackers to execute arbitrary SQL commands via unknown attack vectors.

[CNNVD]PHlyMail SQL注入漏洞(CNNVD-200512-954)

        PHlyMail 3.02.01存在SQL注入漏洞,远程攻击者可通过未知的攻击矢量执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  16310
(UNKNOWN)  VUPEN  ADV-2006-0261
(UNKNOWN)  XF  phlymail-unknown-sql-injection(24238)

- 漏洞信息

PHlyMail SQL注入漏洞
中危 SQL注入
2005-12-31 00:00:00 2006-01-17 00:00:00
        PHlyMail 3.02.01存在SQL注入漏洞,远程攻击者可通过未知的攻击矢量执行任意SQL命令。

- 公告与补丁


- 漏洞信息

PHlyMail Multiple Unspecified SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

PHlyMail contains a flaw that may allow an attacker to carry out an SQL injection attack. This may allow an attacker to inject or manipulate SQL queries in the back-end database. No further details have been provided.

- 时间线

2005-11-18 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 3.3Beta1 (3.02.07) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

PHlyMail Multiple Input Validation Vulnerabilities
Input Validation Error 16310
Yes No
2006-01-19 12:00:00 2006-02-07 08:54:00
These issues were disclosed by the vendor.

- 受影响的程序版本

PHlyMail PHlyMail 3.0.2 .01
PHlyMail PHlyMail 3.0.2 .00
PHlyMail PHlyMail 3.0.2 .07

- 不受影响的程序版本

PHlyMail PHlyMail 3.0.2 .07

- 漏洞讨论

PHlyMail is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

Successful exploitation of these vulnerabilities could result in a compromise of the application, disclosure or modification of data, the theft of cookie-based authentication credentials. They may also permit an attacker to exploit vulnerabilities in the underlying database implementation as well as other attacks.

- 漏洞利用

An exploit is not required.

- 解决方案

The vendor has released an update addressing these issues. Users are advised to contact the vendor for details on obtaining the appropriate updates.

- 相关参考