漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-0115220
漏洞标题:7k7k某站点MySQL盲注
相关厂商:奇客星空
漏洞作者: 路人甲
提交时间:2015-05-20 21:13
修复时间:2015-05-25 21:14
公开时间:2015-05-25 21:14
漏洞类型:SQL注射漏洞
危害等级:中
自评Rank:6
漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2015-05-20: 细节已通知厂商并且等待厂商处理中
2015-05-25: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
7k7k某站点MySQL盲注
详细说明:
注射点:
参数 id可注入。
漏洞证明:
current user: 'QK_NaiTang@192.168.%.%'
current database: 'nt_game'
available databases [5]:
[*] information_schema
[*] nt_comment
[*] nt_game
[*] nt_gift
[*] nt_mobile_config
Database: nt_game
[66 tables]
+----------------------------+
| 7k7k_mobile_client_version |
| version |
| admin |
| adminmanager |
| agent |
| album |
| album_relation |
| archives |
| bak_1212b_game_u |
| bak_1226_game_detail_u |
| biggame |
| biggame_detail |
| brand |
| brand_relation |
| category |
| channel |
| channel_package |
| checkdown |
| codes |
| compare |
| compare_copy |
| compare_dangle |
| compare_dangle_copy |
| compare_dangle_wuxian |
| content |
| correspondence |
| dev_edit |
| developer |
| feedback |
| game |
| game_delete |
| game_detail |
| game_detail_two |
| game_detail_u |
| game_lation |
| game_lation_bak_copy |
| game_lation_copy |
| game_rela_master |
| game_relation |
| game_status |
| game_two |
| game_u |
| gift |
| goitunes |
| keyword_search |
| log |
| mobile_client_version |
| mobilestore |
| p3View |
| p4View |
| pc_client_version |
| phone_model |
| pm_message |
| pro_category |
| pro_relation |
| rela_flash |
| special |
| tag |
| tag_relation |
| tags |
| tags_relation |
| tmp_guan |
| tmp_list |
| tui_tmp |
| web_setting |
| web_setting_f |
+----------------------------+
有72个管理员帐号
Database: nt_game
+-------+---------+
| Table | Entries |
+-------+---------+
| admin | 72 |
+-------+---------+
修复方案:
参数过滤
版权声明:转载请注明来源 路人甲@乌云
漏洞回应
厂商回应:
危害等级:无影响厂商忽略
忽略时间:2015-05-25 21:14
厂商回复:
漏洞Rank:8 (WooYun评价)
最新状态:
2015-06-17:对不起白帽子同学,没收到乌云的报警。发现的时候已经忽略了。