首页 -> 安全研究

安全研究

安全漏洞
SquirrelMail abook_database.php远程SQL注入漏洞

发布日期:2004-08-03
更新日期:2004-08-04

受影响系统:
SquirrelMail SquirrelMail 1.4.2
SquirrelMail SquirrelMail 1.4.0
SquirrelMail SquirrelMail 1.2.8
SquirrelMail SquirrelMail 1.2.7
SquirrelMail SquirrelMail 1.2.6
SquirrelMail SquirrelMail 1.2.5
SquirrelMail SquirrelMail 1.2.3
SquirrelMail SquirrelMail 1.2.2
SquirrelMail SquirrelMail 1.2.11
SquirrelMail SquirrelMail 1.2.1
SquirrelMail SquirrelMail 1.2.0
SquirrelMail SquirrelMail 1.0.5
SquirrelMail SquirrelMail 1.0.4
不受影响系统:
SquirrelMail SquirrelMail 1.4.3 RC1
SquirrelMail SquirrelMail 1.4.3
描述:
CVE(CAN) ID: CVE-2004-0521

SquirrelMail是一款流行的基于WEB的邮件服务程序。

SquirrelMail包含的'abook_database.php'脚本对用户提交的参数缺少充分过滤,远程攻击者可以利用这个漏洞进行SQL注入攻击,可能获得敏感信息或更改数据库。

'abook_database.php'脚本对'$alias'变量缺少正确过滤,用户提交包含恶意SQL命令的数据作为此变量参数,可更改原来的SQL逻辑,导致攻击者可以获得敏感信息或更改数据库。

<*来源:Marc Groot Koerkamp (stekkel@users.sourceforge.net
  
  链接:http://www.securitytracker.com/alerts/2004/Aug/1010842.html
*>

建议:
厂商补丁:

SquirrelMail
------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载SquirrleMail 1.4.3 RC1及之后的版本:

http://www.squirrelmail.org/download.php

或采用如下补丁:

Index: abook_database.php
===================================================================
RCS file: /cvsroot/squirrelmail/squirrelmail/functions/abook_database.php,v
retrieving revision 1.15.2.1
retrieving revision 1.15.2.2
diff -u -w -r1.15.2.1 -r1.15.2.2
--- abook_database.php    24 Feb 2004 15:57:14 -0000    1.15.2.1
+++ abook_database.php    27 Apr 2004 19:20:18 -0000    1.15.2.2
@@ -163,7 +163,7 @@
          }

          $query = sprintf("SELECT * FROM %s WHERE owner='%s' AND nickname='%s'",
-                         $this->table, $this->owner, $alias);
+                         $this->table, $this->owner, $this->dbh->quoteString($alias));

          $res = $this->dbh->query($query);

浏览次数:3725
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障