通过 VulDB 提交漏洞并获取 CVE 漏洞编号指南
2024-10-5 16:35:12 Author: www.zhaoj.in(查看原文) 阅读量:12 收藏

前言

通过 VulDB 来提交漏洞并获取 CVE 编号确实比直接邮件去提交和获取 CVE 编号快很多,来记录和分享一下。

步骤

1.先准备好你的漏洞文档,可以按照如下的格式来书写。

## Title: SQL Injection Vulnerability in WebAppX ≤ 1.2.3

**BUG_Author:** your_username

**Affected Version:** WebAppX ≤ 1.2.3

**Vendor:** [WebAppX GitHub Repository](https://github.com/example/WebAppX)

**Software:** [WebAppX](https://github.com/example/WebAppX)

**Vulnerability Files:**
- `app/controller/user.class.php`

## Description:

1. **SQL Injection via User Login:**
   - In the file `app/controller/user.class.php`, the login function does not properly sanitize user input before using it in an SQL query.
   - This can be exploited by sending a crafted request to the login endpoint with malicious SQL code.

2. **Exploiting the SQL Injection:**
   - By injecting SQL commands into the username or password fields, an attacker can manipulate the SQL query to bypass authentication or extract sensitive information from the database.

3. **Example SQL Injection Payload:**
   - The following payload can be used to bypass authentication:
     ```
     Username: ' OR '1'='1
     Password: ' OR '1'='1
     ```

4. **Requesting the Login Endpoint:**
   - Make a request to the login endpoint with the SQL injection payload:
     ```
     http://<target-ip>/index.php?user/login
     ```
   - Use the above payload in the username and password fields.

5. **Verifying the Exploit:**
   - If the injection is successful, the attacker will be logged in as an authenticated user without needing valid credentials.

## Proof of Concept:

1. Access the login page of the vulnerable application:
   ```
   http://<target-ip>/index.php?user/login
   ```

2. Use the following credentials to attempt login:
   ```
   Username: ' OR '1'='1
   Password: ' OR '1'='1
   ```

3. If successful, the application will log in the attacker without requiring valid credentials.

2. 然后把写好的漏洞文档放到某个可以被公开访问的链接上,比如我是放到自己的笔记库里。也可以放到飞书文档或者石墨文档,开公开分享即可。

3. 然后打开 https://vuldb.com/,选择到 Signup,注册一个新账号。

然后填入相关信息,进行注册。

点击“Signup”提交注册请求。

4. 然后到邮箱里点击链接确认注册请求。

然后在打开的链接里设定用户名和密码,点击“Signup”完成注册。

5. 然后点击 ENTRIES->ADD,进入漏洞提交页面。

用英语填写漏洞信息。

切记要把最后请求这个 CVE 编号的按钮点上。

6. 然后点击“ADD”完成提交。

7. 在审核通过后,就会直接分配CVE编号了。

一般几个小时后就可以被检索到了。


文章来源: https://www.zhaoj.in/read-9027.html
如有侵权请联系:admin#unsafe.sh