Jportal module/down.inc.php SQL注入漏洞

Jportal module/down.inc.php SQL注入漏洞

漏洞ID 1109009 漏洞类型 SQL注入
发布时间 2005-08-21 更新时间 2005-09-23
图片[1]-Jportal module/down.inc.php SQL注入漏洞-安全小百科CVE编号 CVE-2005-3052
图片[2]-Jportal module/down.inc.php SQL注入漏洞-安全小百科CNNVD-ID CNNVD-200509-236
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/26293
https://www.securityfocus.com/bid/88806
https://cxsecurity.com/issue/WLB-2005090017
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200509-236
|漏洞详情
JPortal是目前最为符合JSR-168Spec的Portal实现。他使用了拦截器技术和DynamicProxy来实现Portlet的可插入设计。Jportal2.3.1版本的module/down.inc.php中存在SQL注入漏洞,远程攻击者可以通过注入到download.php的search字段执行任意SQL指令。
|漏洞EXP
source: http://www.securityfocus.com/bid/14926/info

JPortal is prone to an SQL injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in an SQL query.

Successful exploitation could result in a compromise of the application, disclosure or modification of data, or may permit an attacker to exploit vulnerabilities in the underlying database implementation. 

a%' UNION SELECT NULL , NULL , nick , pass, NULL , NULL , NULL , NULL , NULL , NULL , NULL , NULL FROM admins/*
|参考资料

来源:BUGTRAQ
名称:20050923SqlinjectioninjPortalversion2.3.1(moduledownload)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=112748957426316&w;=2
来源:SREASON
名称:20
链接:http://securityreason.com/securityalert/20

相关推荐: NetScreen ScreenOS 4.0.1/4.0.3 – TCP Window Size Remote Denial of Service

NetScreen ScreenOS 4.0.1/4.0.3 – TCP Window Size Remote Denial of Service 漏洞ID 1054062 漏洞类型 发布时间 2003-07-29 更新时间 2003-07-29 CVE编号 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享