CVE-2005-3022 (CNNVD-200509-190)
中文标题:
vBulletin多个SQL注入漏洞
英文标题:
Multiple SQL injection vulnerabilities in vBulletin 3.0.9 and earlier allow remote attackers to exec...
漏洞描述
中文描述:
Vbulletion是一个功能强大、可扩展和可完全定制的 Web 站点论坛,由PHP 编写,是大中站点社区建构理想的解决方案。 vBulletin 3.0.9版本及早期版本中存在多个SQL注入漏洞,远程攻击者可以通过:(1)提交到announcement.php文件的announcement参数, (2)提交到user.php文件的userid参数,(3)提交到admincalendar.php文件的calendar参数, (4)提交到cronlog.php文件的cronid参数, (5)提交到email.php文件的usergroupid参数, (6)提交到help.php文件的help参数, (7)提交到language.php文件的rvt参数, (8)提交到phrase.php文件的keep参数, 或 (9)提交到usertools.php文件的updateprofilepic参数执行任意SQL指令。
英文描述:
Multiple SQL injection vulnerabilities in vBulletin 3.0.9 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, (2) userid parameter to user.php, (3) calendar parameter to admincalendar.php, (4) cronid parameter to cronlog.php, (5) usergroupid parameter to email.php, (6) help parameter to help.php, (7) rvt parameter to language.php, (8) keep parameter to phrase.php, or (9) updateprofilepic parameter to usertools.php.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| jelsoft | vbulletin | 1.0.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0_rc2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0_rc3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.8 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.9 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.8 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.8:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.9 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.9:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_gamma | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:N/AC:L/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-3022 |
2025-11-11 15:17:36 | 2025-11-11 07:32:28 |
| NVD | nvd_CVE-2005-3022 |
2025-11-11 14:51:20 | 2025-11-11 07:41:14 |
| CNNVD | cnnvd_CNNVD-200509-190 |
2025-11-11 15:08:48 | 2025-11-11 07:49:00 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> SQL注入
- cnnvd_id: 未提取 -> CNNVD-200509-190
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 35
- data_sources: ['cve'] -> ['cve', 'nvd']