Dolibarr多个SQL注入漏洞(CVE-2014-7137)

发布日期:2014-11-19
更新日期:2014-11-21

受影响系统:
Dolibarr Dolibarr ERP 3.5.3
不受影响系统:
Dolibarr Dolibarr ERP 3.6.1
描述:
BUGTRAQ  ID: 71189
 CVE(CAN) ID: CVE-2014-7137

 Dolibarr ERP/CRM是管理公司业务信息的软件。

Dolibarr 3.5.3及其他版本在实现上存在多个SQL注入漏洞,攻击者可利用此漏洞执行未授权数据库操作。

<*来源:Jerzy Kramarz
 
  链接:http://www.securityfocus.com/archive/1/534020
 *>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
http://[IP]/dolibarr/product/stock/fiche.php?action=edit&id=1<SQL Injection>

 http://[IP]/dolibarr/product/stock/liste.php?sref=55<SQL Injection>&token=142abe4c1c4b84c3d0c81533c3840cc4&sall=55

 http://[IP]/dolibarr/product/stock/liste.php?sref=555-555-0199 (at) example (dot) c [email concealed]
 om&token=142abe4c1c4b84c3d0c81533c3840cc4&sall=55<SQL Injection>

 http://[IP]/dolibarr/projet/element.php?ref=PJ1407<SQL Injection>

 http://[IP]/dolibarr/projet/tasks/index.php?search_project=5<SQL Injection>bqve&button_search.x=1&button_search.y=1&mode=

 http://[IP]/dolibarr/compta/prelevement/demandes.php?search_societe=5<SQ
 L Injection>&search_facture=5&button_search.x=1&button_search.y=1

 http://[IP]/dolibarr/comm/mailing/liste.php?sref=5<SQL Injection>&sall=5&x=1&y=1

 http://[IP]/dolibarr/comm/mailing/liste.php?sref=5&sall=5<SQL Injection>&x=1&y=1

 http://[IP]/dolibarr/compta/sociales/index.php?search_label=5<SQL Injection>&button_search.x=1&button_search.y=1

 http://[IP]/dolibarr/compta/paiement/cheque/liste.php?sortfield=bc.numbe
 r<SQL Injection>&sortorder=asc&begin=&

 http://[IP]/dolibarr/compta/paiement/cheque/liste.php?sortfield=bc.numbe
 r&sortorder=asc<SQL Injection>&begin=&

 http://[IP]/dolibarr/compta/prelevement/rejets.php?sortfield=p.ref<SQL Injection>&sortorder=asc&begin=&

 http://[IP]/dolibarr/compta/prelevement/rejets.php?sortfield=p.ref&sorto
 rder=asc<SQL Injection>&begin=&

 http://[IP]/dolibarr/product/liste.php?sortfield=p.ref&sortorder=asc&beg
 in=&sref=&snom=&sall=&tosell=<SQL Injection>&tobuy=&type=&

 http://[IP]/dolibarr/product/liste.php?sortfield=p.ref&sortorder=asc&beg
 in=&sref=&snom=&sall=&tosell=&tobuy=<SQL Injection>&type=&

 http://[IP]/dolibarr/product/reassort.php?toolowstock=on&snom=5&sortorde
 r=ASC&sref=5&token=d638ca7f80a7ad68e2cf327a75f954a6&button_search.x=1&bu
 tton_search.y=1&type=&search_categ=4<SQL Injection>&sortfield=stock_physique

 http://[IP]/dolibarr/product/liste.php?sortfield=p.ref&sortorder=asc&beg
 in=&sref=&snom=&sall=&tosell=1<SQL Injection>&tobuy=&type=&

 http://[IP]/dolibarr/product/liste.php?sortfield=p.ref&sortorder=asc&beg
 in=&sref=&snom=&sall=&tosell=1&tobuy=<SQL Injection>&type=&

 http://[IP]/dolibarr/product/stats/commande_fournisseur.php?sortfield=c.
 rowid<SQL Injection>&sortorder=asc&begin=&id=2

 http://[IP]/dolibarr/product/stats/commande_fournisseur.php?sortfield=c.
 rowid&sortorder=asc<SQL Injection>&begin=&id=2

 http://[IP]/dolibarr/product/stats/contrat.php?sortfield=c.rowid<SQL Injection>&sortorder=asc&begin=&id=2

 http://[IP]/dolibarr/product/stats/contrat.php?sortfield=c.rowid'&sortor
 der=asc<SQL Injection>&begin=&id=2

 http://[IP]/dolibarr/product/stats/facture_fournisseur.php?sortfield=s.r
 owid<SQL Injection>&sortorder=asc&begin=&id=2

 http://[IP]/dolibarr/product/stats/facture_fournisseur.php?sortfield=s.r
 owid&sortorder=asc<SQL Injection>&begin=&id=2

 http://[IP]/dolibarr/product/stats/propal.php?sortfield=p.rowid<SQL Injection>&sortorder=asc&begin=&id=2

 http://[IP]/dolibarr/product/stats/propal.php?sortfield=p.rowid&sortorde
 r=asc<SQL Injection>&begin=&id=2

 http://[IP]/dolibarr/product/stock/fiche.php?id=0<SQL Injection>

 http://[IP]/dolibarr/product/stock/info.php?id=0<SQL Injection>

 http://[IP]/dolibarr/product/stock/liste.phpsortfield=e.label&sortorder=
 asc<SQL Injection>&begin=&

 http://[IP]/dolibarr/product/stock/liste.php?sortfield=e.label<SQL Injection>&sortorder=asc&begin=&

 http://[IP]/dolibarr/product/reassort.php?toolowstock=on&snom=5&sortorde
 r=ASC&sref=5<SQL Injection>&token=d638ca7f80a7ad68e2cf327a75f954a6&button_search.x=1&butt
 on_search.y=1&type=&search_categ=4&sortfield=stock_physique

 http://[IP]/dolibarr/product/stock/massstockmove.php?productid=1<SQL Injection>&token=9d491e55462571d39390bd136f4f50da&id_tw=-1&action=addlin
 e&qty=5&id_sw=-1&addline=%D8%B1%D8%AA%D8%AE%D8%A7&search_productid=5

 http://[IP]/dolibarr/product/stock/replenishorders.php?sortfield=cf.ref&
 sortorder=asc<SQL Injection>&begin=&

 http://[IP]/dolibarr/product/stock/replenishorders.php?sortfield=cf.ref<
 SQL Injection>&sortorder=asc&begin=&

 http://[IP]/dolibarr/projet/contact.php?id=1&action=deletecontact&lineid
 =21<SQL Injection>

 http://[IP]/dolibarr/projet/contact.php?id=1&action=swapstatut&ligne=21<
 SQL Injection>

 http://[IP]/dolibarr/projet/tasks/contact.php?id=1&action=swapstatut&lig
 ne=21<SQL Injection>

 http://[IP]/dolibarr/compta/recap-compta.php?socid=1<SQL Injection>

 http://[IP]/dolibarr/holiday/index.php?mainmenu=holiday&id=1<SQL Injection>

 http://[IP]/dolibarr/projet/tasks/contact.php?id=2&source=internal&token
 =acff06ed1720e3ec66a16918dcee2bfd&action=addcontact&type=181&contactid=2
 <SQL Injection>&withproject=1

 http://[IP]/dolibarr/product/stock/fiche.php?id=1<SQL Injection>

 http://[IP]/dolibarr/projet/contact.php?ref=PJ1407-0002<SQL Injection>

 http://[IP]/dolibarr/projet/ganttview.php?ref=PJ1407-0002<SQL Injection>

 http://[IP]/dolibarr/product/stock/fiche.php?id=1<SQL Injection>

 http://[IP]/dolibarr/projet/note.php?ref=PJ1407-0002<SQL Injection>

 http://[IP]/dolibarr/projet/tasks/contact.php?project_ref=PJ1407-0002<SQ
 L Injection>&withproject=1

 http://[IP]/dolibarr/projet/tasks.php?ref=PJ1407-0002<SQL Injection>&mode=mine

 http://[IP]/dolibarr/projet/tasks/note.php?project_ref=PJ1407-0002<SQL Injection>&withproject=1

 http://[IP]/dolibarr/contact/info.php?id=2<SQL Injection>&optioncss=print

 http://[IP]/dolibarr/societe/commerciaux.php?socid=117260852<SQL Injection>&optioncss=print

 http://[IP]/dolibarr/compta/dons/liste.php?statut=2<SQL Injection>

 http://[IP]/dolibarr/societe/rib.php?socid=1<SQL Injection>&optioncss=print

 http://[IP]/dolibarr/adherents/liste.php?leftmenu=members&statut=1<SQL Injection>&filter=outofdate&idmenu=9431&mainmenu=members

 http://[IP]/dolibarr/product/reassort.php?sortfield=p.ref&sortorder=asc&
 begin=&tosell=43<SQL Injection>&tobuy=&type=0&fourn_id=&snom=&sref=&

 http://[IP]/dolibarr/product/reassort.php?sortfield=p.ref&sortorder=asc&
 begin=&tosell=&tobuy=3<SQL Injection>&type=0&fourn_id=&snom=&sref=&

 http://[IP]/dolhttp://[IP]/dolibarr/product/index.php?leftmenu=product&t
 ype=0<SQL Injection>&idmenu=2819&mainmenu=products

 http://[IP]/dolibarr/product/stats/facture.php?sortfield=s.rowid<SQL Injection>&sortorder=asc&begin=&id=2

 http://[IP]/dolibarr/product/stats/facture.php?sortfield=s.rowid&sortord
 er=asc<SQL Injection>&begin=&id=2

 http://[IP]/dolibarr/user/index.php?sortfield=u.login&sortorder=asc&begi
 n=search_user=&sall=&search_statut=<SQL Injection>&

 http://[IP]/dolibarr/compta/bank/fiche.php?id=<SQL Injection>

 http://[IP]/dolibarr/compta/prelevement/liste.php?search_code=5<SQL Injection>&search_societe=5&search_ligne=5&search_bon=5&button_search.x=
 1&button_search.y=1

 http://[IP]/dolibarr/compta/prelevement/liste.php?search_code=5&search_s
 ociete=5<SQL Injection>&search_ligne=5&search_bon=5&button_search.x=1&button_search.y
 =1

 http://[IP]/dolibarr/compta/prelevement/liste.php?search_code=5&search_s
 ociete=5&search_ligne=5<SQL Injection>&search_bon=5&button_search.x=1&button_search.y=1

 http://[IP]/dolibarr/compta/prelevement/liste.php?search_code=5&search_s
 ociete=5&search_ligne=5&search_bon=5<SQL Injection>&button_search.x=1&button_search.y=1

 http://[IP]/dolibarr/compta/prelevement/bons.php?sortfield=p.ref&sortord
 er=asc<SQL Injection>&begin=&

 http://[IP]/dolibarr/compta/prelevement/bons.php?sortfield=p.ref<SQL Injection>&sortorder=asc&begin=&

 http://[IP]/dolibarr/product/stats/commande.php?sortfield=c.rowid&sortor
 der=asc<SQL Injection>&begin=&id=2

 http://[IP]/dolibarr/product/stats/commande.php?sortfield=c.rowid<SQL Injection>&sortorder=asc&begin=&id=2

建议:
厂商补丁:

Dolibarr
 --------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://www.dolibarr.org/
https://www.portcullis-security.com/security-research-and-downloads/secu
 rity-advisories/cve-2014-7137/

Dolibarr 的详细介绍:请点这里
Dolibarr 的下载地址:请点这里

相关推荐