当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2012-013240

漏洞标题:anwsion漏洞小礼包

相关厂商:anwsion.com

漏洞作者: 瘦蛟舞

提交时间:2012-10-11 12:10

修复时间:2012-10-16 12:11

公开时间:2012-10-16 12:11

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2012-10-11: 细节已通知厂商并且等待厂商处理中
2012-10-16: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

小礼包=小礼物?

详细说明:

1.数据库配置信息泄漏
http://wenda.anwsion.com/system/config/database.php_bak
2.SQLI
一个http://wenda.anwsion.com/category/1'"
两个http://wenda.anwsion.com/account/ajax/login_process/
POST:net_auto_login=1&password=123456&post_hash=9ed50d5bb8509404&return_url=http%3A%2F%2Fwenda.anwsion.com%2F&user_name=%5c
3.SVN
http://wenda.anwsion.com/.svn/entries
http://wenda.anwsion.com/app/.svn/entries
http://wenda.anwsion.com/static/.svn/entries
http://wenda.anwsion.com/models/.svn/entries
http://wenda.anwsion.com/install/.svn/entries
http://wenda.anwsion.com/system/.svn/entries
http://wenda.anwsion.com/views/.svn/entries
4.error message 泄漏绝对路径
http://wenda.anwsion.com/app/account/ajax.php
http://wenda.anwsion.com/app/account/find_password.php
http://wenda.anwsion.com/app/account/main.php
http://wenda.anwsion.com/app/account/openid.php
http://wenda.anwsion.com/app/account/qq.php
http://wenda.anwsion.com/app/account/setting.php

漏洞证明:

修复方案:

1.访问控制
2.输入过滤
3.<Directory ~ "\.svn">
Order allow,deny
Deny from all
</Directory>
4.关闭回显

版权声明:转载请注明来源 瘦蛟舞@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2012-10-16 12:11

厂商回复:

最新状态:

2012-10-16:新版本已经修复