Verosky Media Instant Photo Gallery portfolio_photo_popup.php SQL注入漏洞

漏洞信息详情

Verosky Media Instant Photo Gallery portfolio_photo_popup.php SQL注入漏洞

漏洞简介

Verosky Media Instant Photo Gallery 1.0.2中的portfolio_photo_popup.php 存在SQL注入漏洞。这使得远程攻击者可以借助于id参数执行任意SQL命令。在调用includes/functions/fns_std.php中的count_click 函数之前,id参数并未被清理。注意:此问题可导致跨站脚本攻击。

漏洞公告

参考网址

来源: BID

名称: 17696

链接:http://www.securityfocus.com/bid/17696

来源: BUGTRAQ

名称: 20060427 Re: Instant Photo Gallery <= Multiple XSS

链接:http://www.securityfocus.com/archive/1/archive/1/432241/100/0/threaded

来源: BUGTRAQ

名称: 20060425 Instant Photo Gallery <= Multiple XSS

链接:http://www.securityfocus.com/archive/1/432024/100/0/threaded

来源: OSVDB

名称: 24987

链接:http://www.osvdb.org/24987

来源: OSVDB

名称: 24986

链接:http://www.osvdb.org/24986

来源: VUPEN

名称: ADV-2006-1533

链接:http://www.frsirt.com/english/advisories/2006/1533

来源: SECUNIA

名称: 19813

链接:http://secunia.com/advisories/19813

来源: VIM

名称: 20060427 Instant Photo Gallery <= Multiple XSS (fwd)

链接:http://attrition.org/pipermail/vim/2006-April/000733.html

来源: SREASON

名称: 803

链接:http://securityreason.com/securityalert/803

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享