POC详情: 9644382b58403f6de20c2052cf34b1fba0ed188c

来源
关联漏洞
标题: Magento SQL注入漏洞 (CVE-2019-7139)
描述:Magento是美国Magento公司的一套开源的PHP电子商务系统。该系统提供权限管理、搜索引擎和支付网关等功能。 Magento 2.1.18之前的2.1版本、2.2.9之前的2.2版本、2.3.2之前的2.3版本中存在SQL注入漏洞。该漏洞源于基于数据库的应用缺少对外部输入SQL语句的验证。攻击者可利用该漏洞执行非法SQL命令。
描述
Proof-of-Concept (PoC) exploit for CVE-2019-7139, an unauthenticated SQL injection vulnerability in Magento (PRODSECBUG-2198). For educational and security research purposes only. Use with explicit permission from system owners. Includes documentation and mitigations.
介绍
# CVE-2019-7139 PoC: Magento SQL Injection

This repository contains a proof-of-concept (PoC) exploit for **CVE-2019-7139** (PRODSECBUG-2198), an unauthenticated SQL injection vulnerability in Magento, discovered by Charles Fol of Ambionics Security.

## Vulnerability Details
- **CVE ID**: CVE-2019-7139
- **Affected Versions**:
  - Magento Open Source <= 1.9.4.0
  - Magento Commerce <= 1.14.4.0
  - Magento 2.1 <= 2.1.16
  - Magento 2.2 <= 2.2.7
  - Magento 2.3.0
- **Description**: The vulnerability allows unauthenticated attackers to perform SQL injection via the `/catalog/product_frontend_action/synchronize` endpoint, potentially extracting sensitive data or manipulating the database.
- **Impact**: Data exposure, data manipulation, and potential escalation to further attacks.

## Purpose
This PoC is provided for **educational purposes** and **security research** only. It demonstrates how an attacker could exploit CVE-2019-7139 to extract database information using error-based or time-based SQL injection.

## Installation
1. Clone the repository:
   ```bash
   git clone https://github.com/adhammedhat111/CVE-2019-7139-PoC
   ```
2. Navigate to the repository directory:
   ```bash
   cd CVE-2019-7139-PoC
   ```
3. Install dependencies:
   ```bash
   pip install requests
   ```

## Usage
1. Run the PoC:
   ```bash
   python3 exploit.py <target_url>
   ```
2. The script will attempt to enumerate databases, tables, columns, and sample data.

## References
- [CVE-2019-7139](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7139)
- [Magento Security Advisories](https://magento.com/security)
- [Ambionics Security](https://www.ambionics.io/)
- [Pentest-Tools: Exploiting SQL Injection in Magento with SQLmap](https://pentest-tools.com/blog/exploiting-sql-injection-in-magento-with-sqlmap)
- [Lexfo: Magento SQL Injection](https://blog.lexfo.fr/magento-sqli.html)

## Disclaimer
This code is for educational and research purposes only. **Do not use it against systems without explicit permission from the system owner.** The author is not responsible for any misuse or damage caused by this code. Use at your own risk.

## License
This project is licensed under the MIT License. See the LICENSE file for details.
文件快照

[4.0K] /data/pocs/9644382b58403f6de20c2052cf34b1fba0ed188c ├── [5.9K] exploit.py ├── [1.0K] LICENSE └── [2.2K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。