CVE-2005-3024 (CNNVD-200509-207)

HIGH
中文标题:
vBulletin多个SQL注入漏洞
英文标题:
Multiple SQL injection vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to exec...
CVSS分数: 7.5
发布时间: 2005-09-21 04:00:00
漏洞类型: SQL注入
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Vbulletion是一个功能强大、可扩展和可完全定制的 Web 站点论坛,由PHP 编写,是大中站点社区建构理想的解决方案。 vBulletin 3.0.7版及以前版本中存在多个SQL注入漏洞,远程攻击者可以借助以下参数执行任意SQL指令:(1) 注入announcement.php的announcement参数, (2) 注入thread.php的thread[forumid] 参数或 (3) criteria 参数, (4) 注入to user.php的userid参数, (5) 注入admincalendar.php的 calendarcustomfieldid参数, (6) calendarid参数, (7) moderatorid参数, (8) holidayid参数, (9) calendarmoderatorid参数, 或(10) calendar[0] 参数, (11) 注入cronlog.php的cronid 参数, (12) 注入email.php的user[usergroupid][0] 参数, (13) 注入help.php的help[0] 参数, (14) 注入user.php的limitnumber或 (15) limitstart参数, (16) 注入to usertitle.php的usertitleid参数或(17) ids 参数, (18) 注入language.php的rvt[0]参数, (19) 注入phrase.php的keep[0]参数, (20) 注入template.php的dostyleid参数, (21) 注入thread.php或(22) usertools.php的thread[forumid]参数。

英文描述:

Multiple SQL injection vulnerabilities in vBulletin 3.0.7 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) announcement parameter to announcement.php, the (2) thread[forumid] or (3) criteria parameters to thread.php, (4) userid parameter to user.php, the (5) calendarcustomfieldid, (6) calendarid, (7) moderatorid, (8) holidayid, (9) calendarmoderatorid, or (10) calendar[0] parameters to admincalendar.php, (11) the cronid parameter to cronlog.php, (12) user[usergroupid][0] parameter to email.php, (13) help[0] parameter to help.php, the (14) limitnumber or (15) limitstart parameter to user.php, the (16) usertitleid or (17) ids parameters to usertitle.php, (18) rvt[0] parameter to language.php, (19) keep[0] parameter to phrase.php, (20) dostyleid parameter to template.php, (21) thread[forumid] parameter to thread.php, or (22) usertools.php.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
jelsoft vbulletin 1.0.1 - - cpe:2.3:a:jelsoft:vbulletin:1.0.1:*:lite:*:*:*:*:*
jelsoft vbulletin 2.0.3 - - cpe:2.3:a:jelsoft:vbulletin:2.0.3:*:*:*:*:*:*:*
jelsoft vbulletin 2.0_rc2 - - cpe:2.3:a:jelsoft:vbulletin:2.0_rc2:*:*:*:*:*:*:*
jelsoft vbulletin 2.0_rc3 - - cpe:2.3:a:jelsoft:vbulletin:2.0_rc3:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.0 - - cpe:2.3:a:jelsoft:vbulletin:2.2.0:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.1 - - cpe:2.3:a:jelsoft:vbulletin:2.2.1:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.2 - - cpe:2.3:a:jelsoft:vbulletin:2.2.2:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.3 - - cpe:2.3:a:jelsoft:vbulletin:2.2.3:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.4 - - cpe:2.3:a:jelsoft:vbulletin:2.2.4:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.5 - - cpe:2.3:a:jelsoft:vbulletin:2.2.5:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.6 - - cpe:2.3:a:jelsoft:vbulletin:2.2.6:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.7 - - cpe:2.3:a:jelsoft:vbulletin:2.2.7:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.8 - - cpe:2.3:a:jelsoft:vbulletin:2.2.8:*:*:*:*:*:*:*
jelsoft vbulletin 2.2.9 - - cpe:2.3:a:jelsoft:vbulletin:2.2.9:*:*:*:*:*:*:*
jelsoft vbulletin 2.3.0 - - cpe:2.3:a:jelsoft:vbulletin:2.3.0:*:*:*:*:*:*:*
jelsoft vbulletin 2.3.2 - - cpe:2.3:a:jelsoft:vbulletin:2.3.2:*:*:*:*:*:*:*
jelsoft vbulletin 2.3.3 - - cpe:2.3:a:jelsoft:vbulletin:2.3.3:*:*:*:*:*:*:*
jelsoft vbulletin 2.3.4 - - cpe:2.3:a:jelsoft:vbulletin:2.3.4:*:*:*:*:*:*:*
jelsoft vbulletin 3.0 - - cpe:2.3:a:jelsoft:vbulletin:3.0:*:*:*:*:*:*:*
jelsoft vbulletin 3.0.1 - - cpe:2.3:a:jelsoft:vbulletin:3.0.1:*:*:*:*:*:*:*
jelsoft vbulletin 3.0.2 - - cpe:2.3:a:jelsoft:vbulletin:3.0.2:*:*:*:*:*:*:*
jelsoft vbulletin 3.0.3 - - cpe:2.3:a:jelsoft:vbulletin:3.0.3:*:*:*:*:*:*:*
jelsoft vbulletin 3.0.4 - - cpe:2.3:a:jelsoft:vbulletin:3.0.4:*:*:*:*:*:*:*
jelsoft vbulletin 3.0.5 - - cpe:2.3:a:jelsoft:vbulletin:3.0.5:*:*:*:*:*:*:*
jelsoft vbulletin 3.0.6 - - cpe:2.3:a:jelsoft:vbulletin:3.0.6:*:*:*:*:*:*:*
jelsoft vbulletin 3.0.7 - - cpe:2.3:a:jelsoft:vbulletin:3.0.7:*:*:*:*:*:*:*
jelsoft vbulletin 3.0_beta_2 - - cpe:2.3:a:jelsoft:vbulletin:3.0_beta_2:*:*:*:*:*:*:*
jelsoft vbulletin 3.0_beta_3 - - cpe:2.3:a:jelsoft:vbulletin:3.0_beta_3:*:*:*:*:*:*:*
jelsoft vbulletin 3.0_beta_4 - - cpe:2.3:a:jelsoft:vbulletin:3.0_beta_4:*:*:*:*:*:*:*
jelsoft vbulletin 3.0_beta_5 - - cpe:2.3:a:jelsoft:vbulletin:3.0_beta_5:*:*:*:*:*:*:*
jelsoft vbulletin 3.0_beta_6 - - cpe:2.3:a:jelsoft:vbulletin:3.0_beta_6:*:*:*:*:*:*:*
jelsoft vbulletin 3.0_beta_7 - - cpe:2.3:a:jelsoft:vbulletin:3.0_beta_7:*:*:*:*:*:*:*
jelsoft vbulletin 3.0_gamma - - cpe:2.3:a:jelsoft:vbulletin:3.0_gamma:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20050920 [BuHa-Security] Multiple vulnerabilities in (admincp/modcp of) mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2005-09-21 04:00:00
修改时间:
2024-08-07 22:53:30
创建时间:
2025-11-11 15:32:28
更新时间:
2025-11-11 15:49:00
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2005-3024 2025-11-11 15:17:36 2025-11-11 07:32:28
NVD nvd_CVE-2005-3024 2025-11-11 14:51:20 2025-11-11 07:41:14
CNNVD cnnvd_CNNVD-200509-207 2025-11-11 15:08:48 2025-11-11 07:49:00
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:00
vulnerability_type: 未提取 → SQL注入; cnnvd_id: 未提取 → CNNVD-200509-207; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> SQL注入
  • cnnvd_id: 未提取 -> CNNVD-200509-207
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:14
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 33; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 33
  • data_sources: ['cve'] -> ['cve', 'nvd']