![]() |
![]() |
#1 |
Forum Aşığı
![]() Üyelik Tarihi: Feb 2007
Konum: ¢αкαℓ.ηєттєη
Yaş: 31
Mesajlar: 4,929
Teşekkür Etme: 235 Thanked 266 Times in 182 Posts
Üye No: 31562
İtibar Gücü: 2444
Rep Puanı : 11542
Rep Derecesi :
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Cinsiyet : Erkek
|
![]() vBulletin 3.0.9 SQL-Injection
Arkadaşlar öncelikle vbulletin hakkında hayal kırıklığına uğradığımı belirtmek isterim... SQL-Injection: (Fixed in vB 3.0.9) =============== > /joinrequests.php: POST: <do=processjoinrequests&usergroupid=22&request[[SQL-Injection]]=0> > /admincp/user.php: GET: <do=find&orderby=username&limitnumber=[SQL-Injection]> GET: <do=find&orderby=username&limitstart=[SQL-Injection]> > /admincp/usertitle.php: GET: <do=edit&usertitleid=0XF> > /admincp/usertools.php: GET: <do=pmuserstats&ids=0XF> o XSS: (Fixed in vB 3.0.9) ===== > /admincp/css.php: GET: <do=doedit&dostyleid=1&group=[XSS]> > /admincp/index.php: GET: <redirect=[XSS]> > /admincp/user.php: GET: <do=emailpassword&email=[XSS]> > /admincp/language.php: GET: <do=rebuild&goto=[XSS]> > /admincp/modlog.php: GET: <do=view&orderby=[XSS]> > /admincp/template.php: GET: <do=colorconverter&hex=[XSS]> GET: <do=colorconverter&rgb=[XSS]> GET: <do=modify&expandset=[XSS] o Arbitrary File Upload: ======================= An user with access to administrator panel (e.g. (Co)Administrator) and the privilege to add avatars/icons/smileys is able to upload arbitrary files. An attacker is able to gain the ability to execute commands under the context of the web server. > /admincp/image.php: POST: <do=upload&table=avatar> POST: <do=upload&table=icon> POST: <do=upload&table=smilie> This issue is not addressed in vBulletin 3.0.9. o Unpatched Bugs: ================ > /modcp/announcement.php: POST: <do=update&announcementid=1&start=24-07-05&end=30-07-05 &announcement[0]=[SQL-Injection]> > /modcp/user.php: GET: <do=avatar&userid=0XF> There are still a lot of security related bugs in the administrator panel of the vBulletin software. An authorized user could elevate his privileges and read sensitive data. > /admincp/admincalendar.php: POST: <do=update&calendarid=1&calendar[daterange]=1970-2030& calendar[0]=[SQL-Injection]> POST: <do=updatemod&moderatorid=1&moderator[calendarid]=0XF> > /admincp/cronlog.php: POST: <do=doprunelog&cronid=0XF> POST: <do=prunelog&cronid=0XF> > /admincp/email.php: POST: <do=makelist&user[usergroupid][0]=[SQL-Injection]> > /admincp/help.php: POST: <do=doedit&help[script]=1&help[0]=[SQL-Injection]> > /admincp/language.php: POST: <do=update&rvt[0]=[SQL-Injection]> > /admincp/phrase.php: POST: <do=completeorphans&keep[0]=[SQL-Injection]> > /admincp/usertools.php: POST: <do=updateprofilepic> Even a privileged user should not be able to add posts, titles, announcements etc. with HTML/JavaScript-Code in it. > Not properly filtered: (XSS) </admincp/announcement.php> </admincp/admincalendar.php> </admincp/bbcode.php> </admincp/cronadmin.php> </admincp/email.php?do=genlist> </admincp/faq.php?do=add> </admincp/forum.php?do=add> </admincp/image.php?do=add&table=avatar/icon/smilie> </admincp/language.php> </admincp/ranks.php?do=add> </admincp/replacement.php?do=add> </admincp/replacement.php?do=edit> </admincp/template.php?do=addstyle> </admincp/template.php?do=edit> </admincp/usergroup.php?do=add> </admincp/usertitle.php> Çözüm : bbulletininizi sürekli güncelleyin ve bütün security(güvenlik) patchlerini(eklerini) ekleyin...
__________________
:wink:
|
![]() |
![]() |
![]() ![]() |
Konuyu Görüntüleyen Aktif Kullanıcılar: 1 (0 üye ve 1 misafir) | |
|
|
![]() |
||||
Konu | Konuyu Başlatan | Forum | Cevaplar | Son Mesaj |
Gasoline Direct Injection (GDI): | F.S.Mehmet1453 | Eskiler (Arşiv) | 0 | 07-08-2007 09:16 AM |