DCI-Taskeen多个SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109810 漏洞类型 SQL注入
发布时间 2006-02-25 更新时间 2006-03-14
CVE编号 CVE-2006-0939 CNNVD-ID CNNVD-200602-431
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/27314
https://cxsecurity.com/issue/WLB-2006020098
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200602-431
|漏洞详情
DCI-Taskeen1.03中存在SQL注入漏洞。远程攻击者可以借助指向(a)basket.php的(1)id或(2)action参数,或指向(b)cat.php的(3)id或(4)page参数执行任意SQL命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/16828/info
 
DCI-Taskeen is prone to multiple SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. 
 
Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

http://www.example.com/cat.php?do=cat&page=1&id=[SQL]
http://www.example/cat.php?do=cat&page=[SQL]
|参考资料

来源:BID
名称:16828
链接:http://www.securityfocus.com/bid/16828
来源:BUGTRAQ
名称:20060225SQLInjectioninDCI-Taskeen
链接:http://www.securityfocus.com/archive/1/426082
来源:SECTRACK
名称:1015685
链接:http://securitytracker.com/id?1015685
来源:XF
名称:dci-taskeen-multiple-scripts-sql-injection(24963)
链接:http://xforce.iss.net/xforce/xfdb/24963
来源:SREASON
名称:495
链接:http://securityreason.com/securityalert/495