关联漏洞
标题:
CMS Made Simple SQL注入漏洞
(CVE-2019-9053)
描述:CMS Made Simple(CMSMS)是CMSMS团队的一套开源的内容管理系统(CMS)。该系统支持基于角色的权限管理系统、基于向导的安装与更新机制、智能缓存机制等。 CMSMS 2.2.8版本中存在SQL注入漏洞,该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
描述
This repository has the sole purpose of rewriting the CVE-2019-9053 script, which in the original publication is written in Python 2.7. I will be using Python 3.
介绍
# CVE 2019-9053
## Detail
### Description
This code is an implementation of a Time-Based Blind SQL Injection attack in Python 3. The attack is designed to exploit a SQL injection vulnerability in a Content Management System (CMS) Made Simple 2.2.8 through an HTTP request.
### Exploit
Use:
```python
exploit.py -u http://target-uri -w /path-wordlist -c
```
## references
[1] [exploit CMS](https://www.exploit-db.com/exploits/46635)
文件快照
[4.0K] /data/pocs/6564729629dde4ffcb01a62a4ecff6c6e58a1134
├── [5.8K] exploit-cve-2019-9053.py
└── [ 439] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。