SquirrelMail abook_database.php远程SQL注入漏洞
发布日期:2004-08-03
更新日期:2004-08-04
受影响系统:SquirrelMail SquirrelMail 1.4.2
SquirrelMail SquirrelMail 1.4.0
SquirrelMail SquirrelMail 1.2.8
SquirrelMail SquirrelMail 1.2.7
SquirrelMail SquirrelMail 1.2.6
SquirrelMail SquirrelMail 1.2.5
SquirrelMail SquirrelMail 1.2.3
SquirrelMail SquirrelMail 1.2.2
SquirrelMail SquirrelMail 1.2.11
SquirrelMail SquirrelMail 1.2.1
SquirrelMail SquirrelMail 1.2.0
SquirrelMail SquirrelMail 1.0.5
SquirrelMail SquirrelMail 1.0.4
不受影响系统:SquirrelMail SquirrelMail 1.4.3 RC1
SquirrelMail SquirrelMail 1.4.3
描述:
CVE(CAN) ID:
CVE-2004-0521
SquirrelMail是一款流行的基于WEB的邮件服务程序。
SquirrelMail包含的'abook_database.php'脚本对用户提交的参数缺少充分过滤,远程攻击者可以利用这个漏洞进行SQL注入攻击,可能获得敏感信息或更改数据库。
'abook_database.php'脚本对'$alias'变量缺少正确过滤,用户提交包含恶意SQL命令的数据作为此变量参数,可更改原来的SQL逻辑,导致攻击者可以获得敏感信息或更改数据库。
<*来源:Marc Groot Koerkamp (
stekkel@users.sourceforge.net)
链接:
http://www.securitytracker.com/alerts/2004/Aug/1010842.html
*>
建议:
厂商补丁:
SquirrelMail
------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载SquirrleMail 1.4.3 RC1及之后的版本:
http://www.squirrelmail.org/download.php
或采用如下补丁:
Index: abook_database.php
===================================================================
RCS file: /cvsroot/squirrelmail/squirrelmail/functions/abook_database.php,v
retrieving revision 1.15.2.1
retrieving revision 1.15.2.2
diff -u -w -r1.15.2.1 -r1.15.2.2
--- abook_database.php 24 Feb 2004 15:57:14 -0000 1.15.2.1
+++ abook_database.php 27 Apr 2004 19:20:18 -0000 1.15.2.2
@@ -163,7 +163,7 @@
}
$query = sprintf("SELECT * FROM %s WHERE owner='%s' AND nickname='%s'",
- $this->table, $this->owner, $alias);
+ $this->table, $this->owner, $this->dbh->quoteString($alias));
$res = $this->dbh->query($query);
浏览次数:3742
严重程度:0(网友投票)