Invision Power Board index.php ck参数远程SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110320 漏洞类型 SQL注入
发布时间 2006-05-25 更新时间 2006-05-25
CVE编号 CVE-2006-2061 CNNVD-ID CNNVD-200604-509
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/27736
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-509
|漏洞详情
InvisionPowerBoard是一款流行的PHP论坛程序InvisionPowerBoard的实现上存在输入验证漏洞,远程攻击者可能利用此漏洞执行SQL注入攻击。在SQL查询中使用之前InvisionPowerBoard没有正确地过滤index.php中对"ck"参数的输入,导致可以通过注入任意SQL代码(仅限32个字符)操控SQL查询。sources/lib/func_taskmanager.php70行中的漏洞代码:$this->cron_key=substr(trim(stripslashes($_REQUEST['ck'])),0,32);没有过滤"ck"输入,导致113行"''where'=>"task_cronkey='".$this->cron_key."'""的SQL注入。
|漏洞EXP
source: http://www.securityfocus.com/bid/17690/info

Invision Power Board is prone to an SQL-injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query. 

Successful exploitation could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

http://www.example.com/index.php?act=task&ck='
|参考资料

来源:BID
名称:17690
链接:http://www.securityfocus.com/bid/17690
来源:BUGTRAQ
名称:20060425InvisionVulnerabilities,includingremotecodeexecution
链接:http://www.securityfocus.com/archive/1/archive/1/431990/100/0/threaded
来源:forums.invisionpower.com
链接:http://forums.invisionpower.com/index.php?showtopic=213374
来源:XF
名称:invision-index-ck-sql-injection(26071)
链接:http://xforce.iss.net/xforce/xfdb/26071
来源:BUGTRAQ
名称:20060427Re:InvisionVulnerabilities,includingremotecodeexecution
链接:http://www.securityfocus.com/archive/1/archive/1/432226/100/0/threaded
来源:VUPEN
名称:ADV-2006-1534
链接:http://www.frsirt.com/english/advisories/2006/1534
来源:SREASON
名称:796
链接:http://securityreason.com/securityalert/796
来源:SECUNIA
名称:19830
链接:http://secunia.com/advisories/19830