AspReady FAQ Manager SQL注入漏洞

AspReady FAQ Manager SQL注入漏洞

漏洞ID 1197622 漏洞类型 SQL注入
发布时间 2005-10-14 更新时间 2005-10-20
图片[1]-AspReady FAQ Manager SQL注入漏洞-安全小百科CVE编号 CVE-2005-3199
图片[2]-AspReady FAQ Manager SQL注入漏洞-安全小百科CNNVD-ID CNNVD-200510-116
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2005100012
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200510-116
|漏洞详情
AspReadyFAQ是一款基于ASP的客服帮助系统。AspReadyFAQ的aradmin.asp中存在多个SQL注入漏洞。远程攻击者可以借助(1)txtLogin和(2)txtPassword参数,执行任意SQL指令。
|漏洞EXP
The free, open source project called "aspReady FAQ" is open for SQL-injection.

This results is admin access with the ability change/delete the entire database.

An example on SQL-inject that works could be:
1'or'1'='1

After doing a google search, I've found out that some companies are actually using this free aspReady FAQ.

Credits to: Preben Nylokken

The system can be found at:
http://pscode.com/vb/scripts/ShowCode.asp?txtCodeId=9055&lngWId=4

Live sample can be found and tested on:
www.itsikkerhet.com/db/faq

- Preben Nyloekken
|参考资料

来源:XF
名称:aspreadyfaq-aradmin-sql-injection(22538)
链接:http://xforce.iss.net/xforce/xfdb/22538
来源:BID
名称:15022
链接:http://www.securityfocus.com/bid/15022
来源:SECUNIA
名称:17091
链接:http://secunia.com/advisories/17091/
来源:BUGTRAQ
名称:20051006aspReadyFAQ-openforSQL-injections
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=112861875408315&w;=2
来源:OSVDB
名称:19917
链接:http://www.osvdb.org/19917
来源:SECTRACK
名称:1015015
链接:http://securitytracker.com/id?1015015
来源:SREASON
名称:52
链接:http://securityreason.com/securityalert/52

相关推荐: Softwin BitDefender AvxScanOnlineCtrl COM Object Information Disclosure Vulnerability

Softwin BitDefender AvxScanOnlineCtrl COM Object Information Disclosure Vulnerability 漏洞ID 1098632 漏洞类型 Design Error 发布时间 2004-04-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享