製品・ソフトウェアに関する情報
Bluetrait の bt-trackback.php における SQL インジェクションの脆弱性
Title Bluetrait の bt-trackback.php における SQL インジェクションの脆弱性
Summary

Bluetrait の bt-trackback.php には、trackback が有効になっている際、SQL インジェクションの脆弱性が存在します。

Possible impacts 第三者により、パラメータを介して、任意の SQL コマンドを実行される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Dec. 13, 2006, midnight
Registration Date June 26, 2012, 3:38 p.m.
Last Update June 26, 2012, 3:38 p.m.
CVSS2.0 : 警告
Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Affected System
bluetrait
bluetrait 1.2.0 未満
CVE (情報セキュリティ 共通脆弱性識別子)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年06月26日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2006-6540
Summary

SQL injection vulnerability in bt-trackback.php in Bluetrait before 1.2.0, when trackback is enabled, allows remote attackers to execute arbitrary SQL commands via unspecified parameters. NOTE: some of these details are obtained from third party information.

Summary

Successful exploitation requires that "trackback" is enabled, which is disabled by default.
This vulnerability is addressed in the following product release:
Bluetrait, Bluetrait, 1.2.0

Publication Date Dec. 14, 2006, 11:28 a.m.
Registration Date Jan. 29, 2021, 3:51 p.m.
Last Update July 29, 2017, 10:29 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:bluetrait:bluetrait:0.3.2:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.3.3:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.3.5:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.3.6:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.3.7:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.3.8:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.3.9:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.3.10:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.3:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.4:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.5:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.6:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.7:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.8_beta1:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.9:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.4.10:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.5.2:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.5.3:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:0.5_beta2:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:bluetrait:bluetrait:*:*:*:*:*:*:*:* 1.1.1
Related information, measures and tools
Common Vulnerabilities List