paFAQ Beta SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1108467 漏洞类型 SQL注入
发布时间 2005-02-17 更新时间 2005-03-30
CVE编号 CVE-2005-0475 CNNVD-ID CNNVD-200503-161
漏洞平台 PHP CVSS评分 6.4
|漏洞来源
https://www.exploit-db.com/exploits/25116
https://www.securityfocus.com/bid/82412
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200503-161
|漏洞详情
paFAQBeta4及可能的其他版本中存在SQL注入漏洞,远程攻击者可以通过question.php的(1)offset、(2)limit、(3)order或(4)orderby参数、(5)answer.php的offset参数、(6)search.php的search_item参数、comment.php的(7)cat_id、(8)cid或(9)id参数,执行任意SQL代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/12582/info
 
paFaq is reportedly affected by an SQL injection vulnerability. This issue exists because the application fails to properly sanitize user-supplied input before using it in SQL queries.
 
Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation.
 
This vulnerability is reported to affect paFaq beta4; earlier versions may also be affected. 

http://www.example.com/index.php?act=Search&code=01&search_item='
|受影响的产品
PHP Arena paFaq Beta4
|参考资料

来源:BUGTRAQ
名称:20050217[PersianHacker.NET200505-07]paFAQBeta4SqlInjection
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=110868808723487&w=2
来源:XF
名称:pafaq-sql-injection(19371)
链接:http://xforce.iss.net/xforce/xfdb/19371