Enthrallweb eHomes 多个SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111614 漏洞类型 SQL注入
发布时间 2006-11-20 更新时间 2006-12-01
CVE编号 CVE-2006-6204 CNNVD-ID CNNVD-200611-485
漏洞平台 ASP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/29123
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200611-485
|漏洞详情
EnthrallwebeHomes存在多个SQL注入漏洞,远程攻击者可以通过传给(a)dircat.asp的(1)cid参数;传给(b)dirSub.asp的(2)sid参数;传给(c)types.asp的(3)TYPE_ID参数;传给(d)homeDetail.asp的(4)AD_ID参数;传给(e)result.asp的(5)cat参数;传给(f)compareHomes.asp的(6)compare,(7)clear和(8)adID参数;和传给(g)result.asp的(9)aminprice,(10)amaxprice和(11)abedrooms参数,来执行任意SQL命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/21193/info
  
eHome is prone to multiple input-validation vulnerabilities, including cross-site scripting, and SQL-injection issues, because the application fails to properly sanitize user-supplied input. 
  
A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.
  
http://www.example.com/result.asp?city=1&cat=2&imageField2=1&State=1&aminprice='[sql]
http://www.example.com/result.asp?city=1&cat=2&imageField2=1&State=1&aminprice=0&amaxprice='[sql]
http://www.example.com/result.asp?city=1&cat=2&imageField2=1&State=1&aminprice=0&amaxprice=10000000&abedrooms='[sql]
|参考资料

来源:XF
名称:ehomes-multiple-sql-injection(30419)
链接:http://xforce.iss.net/xforce/xfdb/30419
来源:BID
名称:21193
链接:http://www.securityfocus.com/bid/21193
来源:BUGTRAQ
名称:20061120ehomes[multiplesinjectionssql]
链接:http://www.securityfocus.com/archive/1/archive/1/452107/100/100/threaded
来源:VUPEN
名称:ADV-2006-4643
链接:http://www.frsirt.com/english/advisories/2006/4643
来源:SECUNIA
名称:23016
链接:http://secunia.com/advisories/23016
来源:MISC
链接:http://s-a-p.ca/index.php?page=OurAdvisories&id=50
来源:SREASON
名称:1942
链接:http://securityreason.com/securityalert/1942