CVE-2006-0897 (CNNVD-200602-392)

HIGH
中文标题:
Virtual Communication Services VPMi Enterprise Service_Requests.ASP SQL注入漏洞
英文标题:
SQL injection vulnerability in VCS Virtual Program Management Intranet (VPMi) Enterprise 3.3 allows ...
CVSS分数: 7.5
发布时间: 2006-02-25 11:00:00
漏洞类型: SQL注入
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

** 有争议 ** VCS Virtual Program Management Intranet (VPMi) Enterprise 3.3中存在SQL注入漏洞。远程攻击者可以借助指向Service_Requests.asp的UpdateID0参数执行任意SQL命令。注意:此信息的来源不详;详情由第三方独家提供。注意:厂商对此问题有争议,说"[我们]具有后台复杂状态管理系统,使用位于JavaScript和Session State(服务器端)中的密钥组合,可以防范你们所说的那种类型的SQL注入。我们已在多种情况下进行了测试,并没有出现什么问题。"后续调查表明原始研究员可能使用无效字段值触发了错误,这不能证明发生了SQL注入;但是,厂商并没有从原始研究员那里得到回应。

英文描述:

SQL injection vulnerability in VCS Virtual Program Management Intranet (VPMi) Enterprise 3.3 allows remote attackers to execute arbitrary SQL commands via the UpdateID0 parameter to Service_Requests.asp. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. NOTE: the vendor has disputed this issue, saying that "[we] have a behind the scenes complex state management system that uses a combination of keys placed in JavaScript and Session State (server side) that protects against the type of SQL injection you describe. We have tested for many of the cases and have not found it to be an issue." Further investigation suggests that the original researcher might have triggered errors using invalid field values, which is not proof of SQL injection; however, the vendor did not receive a response from the original researcher

CWE类型:
CWE-89
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
virtual_communication_services vpmi_enterprise 3.3 - - cpe:2.3:a:virtual_communication_services:vpmi_enterprise:3.3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
16798 vdb-entry
cve.org
访问
18842 third-party-advisory
cve.org
访问
20060310 Re: vendor dispute: VCS mailing-list
cve.org
访问
vpmi-servicerequests-sql-injection(24885) vdb-entry
cve.org
访问
23479 vdb-entry
cve.org
访问
ADV-2006-0725 vdb-entry
cve.org
访问
20060310 vendor dispute: VCS mailing-list
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2006-02-25 11:00:00
修改时间:
2024-08-07 16:48:56
创建时间:
2025-11-11 15:32:32
更新时间:
2025-11-11 15:49:04
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-0897 2025-11-11 15:17:39 2025-11-11 07:32:32
NVD nvd_CVE-2006-0897 2025-11-11 14:51:48 2025-11-11 07:41:17
CNNVD cnnvd_CNNVD-200602-392 2025-11-11 15:08:50 2025-11-11 07:49:04
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:04
vulnerability_type: 未提取 → SQL注入; cnnvd_id: 未提取 → CNNVD-200602-392; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> SQL注入
  • cnnvd_id: 未提取 -> CNNVD-200602-392
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:17
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 1; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 1
  • data_sources: ['cve'] -> ['cve', 'nvd']