請在Chrome、Firefox等現代瀏覽器瀏覽本站。另外提供付費解決DEDE主題修改定制等技術服務,如果需要請 點擊 加我 QQ 說你的需求。

太陽2平臺注冊-讓你知道危害有多大 相關文章 ASP.Net 處理 XSS 保護存在缺陷 為什么選擇手工WEB注入?工具的缺陷 VideoCMS 注入缺陷 Si

培訓電影 太陽2 評論

標題:Landshop v0.9.2 - Multiple Web Vulnerabilities概述:=============The SAMEDIA LandShop#65533; is an innovative tool for the marketing, sale or ren

sale or rent of any kind of real estate through the internet. The LandShop user interface is designed to be flexible。

transparent and fast. Instead of an overload of graphics and Flash animations the visitor will see immediately the business core and easily find the objects of his interest. 影響: ========= LandShop CMS v0.9.2由某缺陷研究工作室發現多個問題 利用方式: ======================= Remote 技術分析: ======== 1.1 A remote SQL Injection vulnerability is detected on LandShops Web Application v0.9.2. The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on the affected application dbms. Successful exploitation of the vulnerability results in dbms application compromise. Vulnerable Module(s): [+] admin/action/objects.php [OB_ID=106] [+] admin/action/areas.php [AREA_ID=9] [+] admin/action/pdf.php [start=2] 2.1 A persistent input validation vulnerabilities are detected on LandShops Web Application v0.9.2. The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent). Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation. Exploitation requires low user inter action. Vulnerable Module(s): [+] Create Object - Input/Output Name 2.2 A persistent input validation vulnerabilities are detected on LandShops Web Application v0.9.2. The bugs allow remote attackers with high required user inter action to edit user accounts. Successful exploitation can lead to account access. To exploit the issue the attacker need to create a manipulated copy the edit user mask/form. Inside of the document the remote can implement his own values for the update because of no form or token protection. When admin get now forced to execute the script via link he is executing the new value on the update of the application if his session is not expired. Vulnerable Module(s): [+] Edit Users Form Picture(s): ../1.png ../2.png ../3.png Proof of Concept: ================= The sql injection vulnerabilities can be exploited by remote attackers without required user inter action. The persistent web vulnerabilities can be exploited by remote attackers with medium high required user inter action. For demonstration or reproduce ... 1.1 https://127.0.0.1/landshop/admin/action/objects.php?action=singleOB_ID=106[SQL-INJECTION] https://127.0.0.1/landshop/admin/action/pdf.php?action=showstart=20[SQL-INJECTION]*keyword=search_area= search_type=search_order=OTR_HEAD https://1 /landshop/admin/action/areas.php?action=singleAREA_ID=5%27[SQL-INJECTION] 2.1 The issue can be exploited by an insert on the Create Object function with script code as value. The result is the persistent execution out of the web application context. Strings: iframe src=https:// /3/iframe ... or scriptalert(document.cookie)/scriptdiv style=1 風險: ===== 1.1 The security risk of the pre auth sql injection vulnerability is estimated as critical. 2.1 The security risk of the persisten input validation vulnerability is estimated as medium. 2.2 The security risk of the cross site request forgery vulnerability is estimated as low. Credits: ======== Vulnerability Research Laboratory - the_storm ([email protected]) Copyright 2012 Vulnerability-Lab 點擊復制鏈接 與好友分享!回本站首頁 相關TAG標簽 缺陷 多個 上一篇: 某外貿公司網站被加入的跳轉代碼解密 下一篇: 血腥!實況轉播SQL注入全過程, 標題:Landshop v0.9.2 - Multiple Web Vulnerabilities 概述: ============= The SAMEDIA LandShop is an innovative tool for the marketing,讓你知道危害有多大 相關文章 ASP.Net 處理 XSS 保護存在缺陷 為什么選擇手工WEB注入?工具的缺陷 VideoCMS 注入缺陷 Simple PHP Blog = 0.5.1 本地文 DirectAdmin v1.34.0 XSRF 創建管理 幾個程序的數據庫下載缺陷 MediaWiki 1.15.1注入缺陷 BlogWorx Blog v1.0 XSS缺陷 Jamit Job Board v3 XSS 缺陷 Docmint CMS v1.0 XSS 缺陷 。


歡迎轉載,本文標題:太陽2平臺注冊-讓你知道危害有多大 相關文章 ASP.Net 處理 XSS 保護存在缺陷 為什么選擇手工WEB注入?工具的缺陷 VideoCMS 注入缺陷 Si,轉載請注明原文網址:http://www.621694.tw//zpxgj/pxdy/532.html
喜歡 (0) or 分享 (0)
發表我的評論
取消評論

表情

您的回復是我們的動力!

  • 昵稱 (必填)
  • 驗證碼 點擊我更換圖片

網友最新評論

重庆快乐10分走势图前50期