IwebNegar 'Comments.PHP' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110924 漏洞类型 SQL注入
发布时间 2006-08-30 更新时间 2006-09-07
CVE编号 CVE-2006-4497 CNNVD-ID CNNVD-200608-495
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28441
https://cxsecurity.com/issue/WLB-2006090008
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-495
|漏洞详情
IwebNegar1.1的comments.php脚本存在SQL注入漏洞,远程攻击者可借助id参数执行任意SQL指令。
|漏洞EXP
source: http://www.securityfocus.com/bid/19757/info

IwebNegar is prone to an SQL-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in an SQL query. 

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

IwebNegar 1.1 is reportedly affected by this issue; other versions may be affected as well.

http://www.example.com/comments.php?id=[SQL Query]
|参考资料

来源:BID
名称:19757
链接:http://www.securityfocus.com/bid/19757
来源:BUGTRAQ
名称:20060830IwebNegarv1.1Multiplevulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/444744/100/0/threaded
来源:XF
名称:iwebnegar-comments-sql-injection(28665)
链接:http://xforce.iss.net/xforce/xfdb/28665
来源:SREASON
名称:1480
链接:http://securityreason.com/securityalert/1480