Retired: Bitweaver Multiple Parameter 多个输入验证漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111509 漏洞类型 输入验证
发布时间 2006-11-10 更新时间 2007-01-15
CVE编号 CVE-2006-6924 CNNVD-ID CNNVD-200701-159
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/28965
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-159
|漏洞详情
bitweaver1.3.1及之前版本存在多个验证漏洞,远程攻击者可以借助一个提交到(1)blogs/list_blogs.php,(2)fisheye/index.php,(3)wiki/orphan_pages.php或(4)wiki/list_pages.php的sort_mode=-98query字符串,来获得敏感信息。这会强制SQ出错。
|漏洞EXP
source: http://www.securityfocus.com/bid/20996/info
    
Bitweaver is prone to multiple SQL-injection and cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data.
    
Exploiting these issues could allow an attacker to steal cookie-based authentication credentials, compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
    
Bitweaver 1.3.1 and prior versions are vulnerable; other versions may also be affected. 
    
Since this issue is a duplicate of the the issue described in BID 20988 (Bitweaver Multiple Input Validation Vulnerabilities), this BID is being retired.
    
http://www.example.com/bitweaver/wiki/list_pages.php?find=&sort_mode=-98
|参考资料

来源:XF
名称:bitweaver-sortmode-sql-injection(30165)
链接:http://xforce.iss.net/xforce/xfdb/30165
来源:BID
名称:20996
链接:http://www.securityfocus.com/bid/20996
来源:VUPEN
名称:ADV-2006-4485
链接:http://www.frsirt.com/english/advisories/2006/4485
来源:SECUNIA
名称:22793
链接:http://secunia.com/advisories/22793
来源:BUGTRAQ
名称:20061106bitweaver<=1.3.1[injectionsql(post)&xss(post)]
链接:http://archives.neohapsis.com/archives/bugtraq/2006-11/0142.html
来源:SREASON
名称:2144
链接:http://securityreason.com/securityalert/2144