⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 php_fusion_6_00_206_sql_injection.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## Script Written By Ferdy Riphagen # <f[dot]riphagen[at]nsec[dot]nl>## Script distributed under the GNU GPLv2 License.#desc["english"] = "Synopsis :The remote web server contains a PHP script that is prone to SQLinjection attacks.Description :PHP-Fusion is installed on the remote system.It is a light-weight open-source content management system (CMS).A vulnerability is reported in the forum module of PHP-Fusion6.00.206 and some early released versions.When the forum module is activated, a registered usercan execute arbitrary SQL injection commands.The failure exists because the application does not properlysanitize user-supplied input in 'options.php' and 'viewforum.php'before using it in the SQL query, and magic_quotes_gpc is set to off.See also :http://www.securityfocus.com/bid/15502http://secunia.com/advisories/17664/Solution :Apply the patch from the php-fusion main site:http://www.php-fusion.co.uk/downloads.php?cat_id=3Risk factor :Medium"; if (description) {script_id(200010);script_version("$Revision: 1.0 $");script_cve_id("CVE-2005-3740");script_bugtraq_id(15502);name["english"] = "PHP-Fusion <= 6.00.206 Forum SQL Injection Vulnerability";script_name(english:name["english"]);script_description(english:desc["english"]);summary["english"] = "Check if PHP-Fusion is vulnerable to SQL Injection attacks";script_summary(english:summary["english"]);script_category(ACT_ATTACK);script_family(english:"CGI abuses");script_copyright(english:"This script is Copyright (C) 2005 Ferdy Riphagen");script_dependencie("http_version.nasl");script_require_ports("Services/www", 80);script_exclude_keys("Settings/disable_cgi_scanning");exit(0);}include("http_func.inc");include("http_keepalive.inc");include("global_settings.inc");port = get_http_port(default:80);if (!get_port_state(port)) exit(0);if (!can_host_php(port:port)) exit(0);if (thorough_tests) dirs = make_list("/php-files", "/forum", "/", "/fusion", cgi_dirs());else dirs = make_list(cgi_dirs());foreach dir (dirs){  # Check if PHP-Fusion exists.  res = http_get_cache(item:string(dir, "/news.php"), port:port); if (res == NULL) exit(0); # Check for the vulnerable versions. if (egrep(pattern: ">Powered by.*PHP-Fusion.*v([45]\.0[01])|6\.(00\.(1[01][56790]|20[46]))", string: res))   {   line = egrep(pattern: ">Powered by.*PHP-Fusion", string: res);  note = string(  "***** Nessus has determined that the vulnerable PHP-Fusion version\n",  "***** is installed on the remote host by checking its version number.\n",  "***** This might be an false positive.\n");   # Check and build the version.  version = ereg_replace(pattern:".*>Powered by.* v([0-9.]+).*", string:line, replace:"\1");  if (version != line)  {   # Build the report.   report = string(   desc["english"], "\n\n",   "Plugin output :\n\n",   "PHP-Fusion is installed on the remote system.\n",   "The version of the application is:\n",   "PHP-Fusion v", version, "\n\n",   "Note :\n\n", note);  }  else report =string(  desc["english"], "\n\n",  "Note :\n\n", note);   security_warning(port:port, data:report);  exit(0); }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -