来源:自学PHP网 时间:2015-04-17 13:02 作者: 阅读:次
[导读] 标题:iScripts EasyCreate CMS v2.0 - Multiple Web Vulnerabilites程序介绍:=============iScripts EasyCreate is an online web site building tool that can be hosted on your serve......
标题:iScripts EasyCreate CMS v2.0 - Multiple Web Vulnerabilites
程序介绍: ============= iScripts EasyCreate is an online web site building tool that can be hosted on your server to provide web site building services to your clients. 具体介绍请看: http://www.iscripts.com/easycreate iScripts EasyCreate v2.0 CMS 含多个漏洞 技术分析: ======== 1.1 A SQL Injection vulnerability is detected in iScripts EasyCreate v 2.0, an online web site building tool. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise. The vulnerability is located in the the editor.php file with the bound vulnerable tempsiteid parameter. Vulnerable Module(s): [+] Editor - Template ID Vulnerable File(s): [+] code/editor.php Vulnerable Parameter(s): [+] tempsiteid=[x] --- SQL Exception Logs --- You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 25 at line 1 1.2 A persistent input validation vulnerability is detected in iScripts EasyCreate v 2.0, an online web site building tool. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). The persistent vulnerability is located in the first name input field value & the output display of the vulnerable editprofile.php. Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action & privileged user account. Vulnerable Module(s): [+] editprofile.php - [First name] 测试证明: ================= 1.1 The sql injection vulnerability can be exploited by remote attackers without user inter action. For demonstration or reproduce ... PoC: http://www.2cto.com /easycreate/cms/code/editor.php?type=new&actiontype=editsite&templateid=128'&tempsiteid=-1 union all select [SQL Injection] -- 1.2 The persistent input validation vulnerabilities can be exploited by remote attackers with low required user inter action. For demonstration or reproduce ... The attacker create an account and then changed his first name to malicious persistent javascript or html code. To change, the first name the attacker needs to go to > main menu > profile manager > edit profile. Then inject the malicious script code i.e., <iframe src=www.vuln-lab.com onload=alert("VL")/> When the admin browses the payments page in the control panel the persistent injected script code will be executed out of the web application context. VULNERABILITY RESEARCH LABORATORY TEAM Website: www.vulnerability-lab.com Mail: research@vulnerability-lab.com |
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com