製品・ソフトウェアに関する情報
Aphpkb のsa.php における SQL インジェクションの脆弱性
Title Aphpkb のsa.php における SQL インジェクションの脆弱性
Summary

Andy's PHP Knowledgebase (Aphpkb) の saa.php には、SQL インジェクションの脆弱性が存在します。 本脆弱性は、CVE-2011-1546 とは異なる脆弱性です。

Possible impacts 第三者により、aid パラメータを介して、任意の SQL コマンドを実行される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date March 16, 2011, midnight
Registration Date March 27, 2012, 6:43 p.m.
Last Update March 27, 2012, 6:43 p.m.
CVSS2.0 : 警告
Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Affected System
Andy's PHP Knowledgebase Project
Andy's PHP Knowledgebase 0.95.3 およびそれ以前
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年03月27日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2011-1555
Summary

SQL injection vulnerability in saa.php in Andy's PHP Knowledgebase (Aphpkb) 0.95.3 and earlier allows remote attackers to execute arbitrary SQL commands via the aid parameter, a different vulnerability than CVE-2011-1546. NOTE: some of these details are obtained from third party information.

Publication Date April 4, 2011, 9:27 p.m.
Registration Date Jan. 28, 2021, 4:38 p.m.
Last Update Nov. 21, 2024, 10:26 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:aphpkb:aphpkb:0.93.9:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.86:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.1:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.45:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.3:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.3:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.87:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.361:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.3:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.93.8:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.8:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.74:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.56:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.88.5:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.65:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.79:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.93.3:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.59:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.4:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.95:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.54:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.1:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.5:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.58:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.6:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.9:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.2:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.57:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.6:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.88.8:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.2:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.7:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.8:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.84:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.55:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.88.6:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.39:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.80:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.72:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.77:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.85:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.371:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.5:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.76:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.70:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.95.1:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.75:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.64:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.66:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.44:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.91:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.42:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.33:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.81:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.6:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.1:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.5:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.63:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.93.2:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.7:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.61:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.93.6:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.88.7:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.53:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.41:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.82:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.35:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.2:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.67:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.21:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.73:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.9:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:*:*:*:*:*:*:*:* 0.95.3
cpe:2.3:a:aphpkb:aphpkb:0.93.5:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.93.4:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.92.4:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.93.1:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.83:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.43:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.88:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.9:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.95.2:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.71:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.62:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.31:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.94.4:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.78:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.52:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.51:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.93.7:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.38:*:*:*:*:*:*:*
cpe:2.3:a:aphpkb:aphpkb:0.89:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List