CVE-2005-3024 (CNNVD-200509-207)
中文标题:
vBulletin多个SQL注入漏洞
英文标题:
Multiple SQL injection vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to exec...
漏洞描述
中文描述:
Vbulletion是一个功能强大、可扩展和可完全定制的 Web 站点论坛,由PHP 编写,是大中站点社区建构理想的解决方案。 vBulletin 3.0.7版及以前版本中存在多个SQL注入漏洞,远程攻击者可以借助以下参数执行任意SQL指令:(1) 注入announcement.php的announcement参数, (2) 注入thread.php的thread[forumid] 参数或 (3) criteria 参数, (4) 注入to user.php的userid参数, (5) 注入admincalendar.php的 calendarcustomfieldid参数, (6) calendarid参数, (7) moderatorid参数, (8) holidayid参数, (9) calendarmoderatorid参数, 或(10) calendar[0] 参数, (11) 注入cronlog.php的cronid 参数, (12) 注入email.php的user[usergroupid][0] 参数, (13) 注入help.php的help[0] 参数, (14) 注入user.php的limitnumber或 (15) limitstart参数, (16) 注入to usertitle.php的usertitleid参数或(17) ids 参数, (18) 注入language.php的rvt[0]参数, (19) 注入phrase.php的keep[0]参数, (20) 注入template.php的dostyleid参数, (21) 注入thread.php或(22) usertools.php的thread[forumid]参数。
英文描述:
Multiple SQL injection vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, the (2) thread[forumid] or (3) criteria parameters to thread.php, (4) userid parameter to user.php, the (5) calendarcustomfieldid, (6) calendarid, (7) moderatorid, (8) holidayid, (9) calendarmoderatorid, or (10) calendar[0] parameters to admincalendar.php, (11) the cronid parameter to cronlog.php, (12) user[usergroupid][0] parameter to email.php, (13) help[0] parameter to help.php, the (14) limitnumber or (15) limitstart parameter to user.php, the (16) usertitleid or (17) ids parameters to usertitle.php, (18) rvt[0] parameter to language.php, (19) keep[0] parameter to phrase.php, (20) dostyleid parameter to template.php, (21) thread[forumid] parameter to thread.php, or (22) usertools.php.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| jelsoft | vbulletin | 1.0.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0_rc2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.0_rc3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.8 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.2.9 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 2.3.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.1 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0.7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_2 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_3 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_4 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_5 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_6 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_beta_7 | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
|
| jelsoft | vbulletin | 3.0_gamma | - | - |
cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:N/AC:L/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-3024 |
2025-11-11 15:17:36 | 2025-11-11 07:32:28 |
| NVD | nvd_CVE-2005-3024 |
2025-11-11 14:51:20 | 2025-11-11 07:41:14 |
| CNNVD | cnnvd_CNNVD-200509-207 |
2025-11-11 15:08:48 | 2025-11-11 07:49:00 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> SQL注入
- cnnvd_id: 未提取 -> CNNVD-200509-207
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 33
- data_sources: ['cve'] -> ['cve', 'nvd']