发布时间 :2006-04-26 14:06:00
修订时间 :2017-07-19 21:31:08

[原文]Multiple SQL injection vulnerabilities in photokorn 1.53 and 1.542 allow remote attackers to execute arbitrary SQL commands via the (1) cat, (2) pic and (3) page parameter in index.php; (4) id parameter in postcard.php; and (5) cat parameter in print.php.

[CNNVD]Photokorn 多个SQL注入漏洞 (CNNVD-200604-502)

        photokorn 1.53 和1.542中存在多个SQL注入漏洞。这使得远程攻击者可以借助于index.php中的参数 (1) cat、(2) pic和(3) page, postcard.php中的参数 (4) id,以及print.php中的参数 (5) cat执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20060425 photokorn 1.53 , 1.542 << Sql
(UNKNOWN)  BID  17683
(UNKNOWN)  VUPEN  ADV-2006-1525
(UNKNOWN)  XF  photokorn-multiple-sql-injection(26066)

- 漏洞信息

Photokorn 多个SQL注入漏洞
中危 SQL注入
2006-04-26 00:00:00 2006-04-27 00:00:00
        photokorn 1.53 和1.542中存在多个SQL注入漏洞。这使得远程攻击者可以借助于index.php中的参数 (1) cat、(2) pic和(3) page, postcard.php中的参数 (4) id,以及print.php中的参数 (5) cat执行任意SQL命令。

- 公告与补丁


- 漏洞信息

photokorn index.php Multiple Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity

- 漏洞描述

Photokorn contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'index.php' script not properly sanitizing user-supplied input to the 'cat', 'pic' and 'page' variables. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

- 时间线

2006-04-24 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Photokorn Multiple SQL Injection Vulnerabilities
Input Validation Error 17683
Yes No
2006-04-25 12:00:00 2008-06-19 03:01:00
Dr.Jr7 is credited with the discovery of these vulnerabilities.

- 受影响的程序版本

KEIL Software photokorn 1.542
KEIL Software photokorn 1.53

- 漏洞讨论

Photokorn is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

- 漏洞利用

Attackers can exploit these issues through a browser.

Example URIs are available:

- 解决方案

Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at:

- 相关参考