CVE-2006-0679
CVSS7.5
发布时间 :2006-02-16 15:06:00
修订时间 :2011-03-07 21:30:35
NMCOS    

[原文]SQL injection vulnerability in index.php in the Your_Account module in PHP-Nuke 7.8 and earlier allows remote attackers to execute arbitrary SQL commands via the username variable (Nickname field).


[CNNVD]PHP-Nuke Your_Account模块远程SQL注入漏洞(CNNVD-200602-245)

        PHP-Nuke是一个广为流行的网站创建和管理工具,它可以使用很多数据库软件作为后端,比如MySQL、PostgreSQL、mSQL、Interbase、Sybase等。
        PHP-Nuke的Your_Account模块实现上存在输入验证漏洞,远程攻击者可能利用此漏洞对服务器程序执行SQL注入攻击。PHP-Nuke的Your_Account模块没有对username参数做充分的过滤检查,远程攻击者可能在此参数中插入恶意的SQL命令,从而非授权获取对后台数据库的操作。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0679
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0679
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200602-245
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/0636
(UNKNOWN)  VUPEN  ADV-2006-0636
http://securityreason.com/securityalert/440
(UNKNOWN)  SREASON  440
http://securityreason.com/securityalert/440
(VENDOR_ADVISORY)  SREASON  440
http://securityreason.com/achievement_securityalert/32
(VENDOR_ADVISORY)  SREASONRES  20060216 Critical SQL Injection PHPNuke <= 7.8 - Your_Account module
http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0358.html
(VENDOR_ADVISORY)  FULLDISC  20060216 Critical SQL Injection PHPNuke <= 7.8 - Your_Account module
http://xforce.iss.net/xforce/xfdb/24769
(UNKNOWN)  XF  phpnuke-youraccount-sql-injection(24769)
http://www.securityfocus.com/bid/16691
(UNKNOWN)  BID  16691
http://www.securityfocus.com/archive/1/archive/1/425173/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060216 Critical SQL Injection PHPNuke <= 7.8 - Your_Account module
http://www.osvdb.org/23259
(UNKNOWN)  OSVDB  23259
http://secunia.com/advisories/18931
(UNKNOWN)  SECUNIA  18931

- 漏洞信息

PHP-Nuke Your_Account模块远程SQL注入漏洞
高危 SQL注入
2006-02-16 00:00:00 2006-02-17 00:00:00
远程  
        PHP-Nuke是一个广为流行的网站创建和管理工具,它可以使用很多数据库软件作为后端,比如MySQL、PostgreSQL、mSQL、Interbase、Sybase等。
        PHP-Nuke的Your_Account模块实现上存在输入验证漏洞,远程攻击者可能利用此漏洞对服务器程序执行SQL注入攻击。PHP-Nuke的Your_Account模块没有对username参数做充分的过滤检查,远程攻击者可能在此参数中插入恶意的SQL命令,从而非授权获取对后台数据库的操作。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://phpnuke.org

- 漏洞信息

23259
PHP-Nuke Your_Account Module Nickname Field SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

PHP-Nuke contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the index.php script not properly sanitizing user-supplied input to the 'username' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

- 时间线

2006-02-16 Unknow
2006-02-16 Unknow

- 解决方案

Upgrade to version 7.9 + patch 3.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

PHPNuke Modules.PHP SQL Injection Vulnerability
Input Validation Error 16691
Yes No
2006-02-16 12:00:00 2006-02-17 02:42:00
sp3x is credited with the discovery of this vulnerability.

- 受影响的程序版本

PHP-Nuke PHP-Nuke 7.7
PHP-Nuke PHP-Nuke 7.6
PHP-Nuke PHP-Nuke 7.5
PHP-Nuke PHP-Nuke 7.4
PHP-Nuke PHP-Nuke 7.3
PHP-Nuke PHP-Nuke 7.2
PHP-Nuke PHP-Nuke 7.1
PHP-Nuke PHP-Nuke 7.0
Francisco Burzi PHP-Nuke 7.8
PHP-Nuke PHP-Nuke 7.9

- 不受影响的程序版本

PHP-Nuke PHP-Nuke 7.9

- 漏洞讨论

PHPNuke is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

- 漏洞利用


No exploit is required.

The following proof of concept URI is available:
http://www.example.com/[phpnuke_dir]/modules.php?name=Your_Account&op=new_user
And fill in all Fields but in Nickname: field enter : ' or 1=1/*


The following proof of concept exploit is also available:

- 解决方案


The vendor has released version 7.9.0 to address this issue.


PHP-Nuke PHP-Nuke 7.0

PHP-Nuke PHP-Nuke 7.1

PHP-Nuke PHP-Nuke 7.2

PHP-Nuke PHP-Nuke 7.3

PHP-Nuke PHP-Nuke 7.4

PHP-Nuke PHP-Nuke 7.5

PHP-Nuke PHP-Nuke 7.6

PHP-Nuke PHP-Nuke 7.7

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站