漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-0108211
漏洞标题:妈妈网某站SQL注入漏洞(和主站同库)
相关厂商:妈妈网
漏洞作者: 忽然之间
提交时间:2015-04-15 21:21
修复时间:2015-05-30 21:26
公开时间:2015-05-30 21:26
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2015-04-15: 细节已通知厂商并且等待厂商处理中
2015-04-15: 厂商已经确认,细节仅向厂商公开
2015-04-25: 细节向核心白帽子及相关领域专家公开
2015-05-05: 细节向普通白帽子公开
2015-05-15: 细节向实习白帽子公开
2015-05-30: 细节向公众公开
简要描述:
妈妈网某站sql注入漏洞(和主站同库)
详细说明:
POST /index.php?g=Api&a=Reservation&d=index HTTP/1.1
Host: yuyue.mama.cn
Proxy-Connection: keep-alive
Content-Length: 238
Accept: application/json, text/javascript, */*; q=0.01
Origin: http://yuyue.mama.cn
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.118 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Referer: http://yuyue.mama.cn/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: mamastatid=vlstat-1428981413000-903033601; Hm_lvt_33a202c76b72207fced5b1e694e07ea1=1428983094; ZwbC_8757_lastvisit=1428979503; qqmail_alias=mama@mama.cn; ZwbC_8757_sid=oAS67S; ZwbC_8757_lastact=1429086294%09tips.php%09; GtC_cityid=gz; mamacn_city_id=1; YIsd_8757_lastvisit=1429083913; YIsd_8757_sid=TjwStm; YIsd_8757_lastact=1429087515%09home.php%09misc; Hm_lvt_f2babe867b10ece0ff53079ad6c04981=1429086597,1429086608,1429086651,1429086660; Hm_lpvt_f2babe867b10ece0ff53079ad6c04981=1429087517; PHPSESSID=rrf3tt58nmifno5k1fjgsiggq6; xloginmama_service=http%253A%252F%252Fyuyue.mama.cn
realname=%E8%B5%B5%E6%97%AD%E5%B0%A7&mobilephone=13713899887&babybirth=2015-4-15&uid=&username=&ss1=%E7%BA%A4%E4%BD%93&cidname=%E7%BE%8E%E5%AE%B9%E7%BA%A4%E4%BD%93&cityname=%E5%B9%BF%E5%B7%9E&areaname=%E5%8D%97%E6%B2%99%E5%8C%BA&isdis=yes
注入参数 areaname
漏洞证明:
修复方案:
过滤
版权声明:转载请注明来源 忽然之间@乌云
漏洞回应
厂商回应:
危害等级:低
漏洞Rank:5
确认时间:2015-04-15 21:25
厂商回复:
谢谢
最新状态:
暂无