CVE-2006-0897
CVSS7.5
发布时间 :2006-02-25 06:02:00
修订时间 :2011-03-07 00:00:00
NMCO    

[原文]** DISPUTED ** SQL injection vulnerability in VCS Virtual Program Management Intranet (VPMi) Enterprise 3.3 allows remote attackers to execute arbitrary SQL commands via the UpdateID0 parameter to Service_Requests.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: the vendor has disputed this issue, saying that "[we] have a behind the scenes complex state management system that uses a combination of keys placed in JavaScript and Session State (server side) that protects against the type of SQL injection you describe. We have tested for many of the cases and have not found it to be an issue." Further investigation suggests that the original researcher might have triggered errors using invalid field values, which is not proof of SQL injection; however, the vendor did not receive a response from the original researcher.


[CNNVD]Virtual Communication Services VPMi Enterprise Service_Requests.ASP SQL注入漏洞(CNNVD-200602-392)

        ** 有争议 ** VCS Virtual Program Management Intranet (VPMi) Enterprise 3.3中存在SQL注入漏洞。远程攻击者可以借助指向Service_Requests.asp的UpdateID0参数执行任意SQL命令。注意:此信息的来源不详;详情由第三方独家提供。注意:厂商对此问题有争议,说"[我们]具有后台复杂状态管理系统,使用位于JavaScript和Session State(服务器端)中的密钥组合,可以防范你们所说的那种类型的SQL注入。我们已在多种情况下进行了测试,并没有出现什么问题。"后续调查表明原始研究员可能使用无效字段值触发了错误,这不能证明发生了SQL注入;但是,厂商并没有从原始研究员那里得到回应。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-89 [SQL命令中使用的特殊元素转义处理不恰当(SQL注入)]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0897
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0897
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200602-392
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/24885
(UNKNOWN)  XF  vpmi-servicerequests-sql-injection(24885)
http://www.vupen.com/english/advisories/2006/0725
(VENDOR_ADVISORY)  VUPEN  ADV-2006-0725
http://www.securityfocus.com/bid/16798
(UNKNOWN)  BID  16798
http://www.osvdb.org/23479
(UNKNOWN)  OSVDB  23479
http://www.attrition.org/pipermail/vim/2006-March/000599.html
(UNKNOWN)  VIM  20060310 Re: vendor dispute: VCS
http://www.attrition.org/pipermail/vim/2006-March/000598.html
(UNKNOWN)  VIM  20060310 vendor dispute: VCS
http://secunia.com/advisories/18842
(VENDOR_ADVISORY)  SECUNIA  18842

- 漏洞信息

Virtual Communication Services VPMi Enterprise Service_Requests.ASP SQL注入漏洞
高危 SQL注入
2006-02-25 00:00:00 2006-03-17 00:00:00
远程  
        ** 有争议 ** VCS Virtual Program Management Intranet (VPMi) Enterprise 3.3中存在SQL注入漏洞。远程攻击者可以借助指向Service_Requests.asp的UpdateID0参数执行任意SQL命令。注意:此信息的来源不详;详情由第三方独家提供。注意:厂商对此问题有争议,说"[我们]具有后台复杂状态管理系统,使用位于JavaScript和Session State(服务器端)中的密钥组合,可以防范你们所说的那种类型的SQL注入。我们已在多种情况下进行了测试,并没有出现什么问题。"后续调查表明原始研究员可能使用无效字段值触发了错误,这不能证明发生了SQL注入;但是,厂商并没有从原始研究员那里得到回应。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本。

- 漏洞信息

23479
VPMi Enterprise Service_Requests.asp UpdateID0 Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

VPMi Enterprise has been reported to contain an SQL injection issue in the Service_Requests.asp script. Subsequent testing has indicated that while an error exception is thrown on some crafted input, the script will provide the error and sometimes a partial path but will not allow SQL query manipulation. The path disclosed is the same information provided in the URL, so it is not a privileged information disclosure.

- 时间线

2006-02-24 Unknow
Unknow Unknow

- 解决方案

The vulnerability reported is incorrect. No solution required.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站