当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2011-03660

漏洞标题:团宝网注射漏洞

相关厂商:团宝网

漏洞作者: piaoye

提交时间:2011-12-17 09:53

修复时间:2012-01-31 09:54

公开时间:2012-01-31 09:54

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:12

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2011-12-17: 积极联系厂商并且等待厂商认领中,细节不对外公开
2012-01-31: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

团购网站最怕注射了吧,影响蛮大。

详细说明:

特别声明:我没做深入测试,也无获取任何信息。

http://pai.groupon.cn/index/index/cityid/


漏洞证明:

Fatal error: Uncaught exception 'PDOException' with message 'SQLSTATE[42000]: Syntax error or access violation: 1064 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '' and endtime > '1324051200' and proid <> '' and startvalues < 5 and endtime<13' at line 1' in /usr/local/apache2/htdocs/library/Zend/Db/Statement/Pdo.php:58 Stack trace: #0 /usr/local/apache2/htdocs/library/Zend/Db/Statement/Pdo.php(58): PDO->prepare('select proid, i...') #1 /usr/local/apache2/htdocs/library/Zend/Db/Statement.php(115): Zend_Db_Statement_Pdo->_prepare('select proid, i...') #2 /usr/local/apache2/htdocs/library/Zend/Db/Adapter/Pdo/Abstract.php(184): Zend_Db_Statement->__construct(Object(Zend_Db_Adapter_Pdo_Mysql), 'select proid, i...') #3 /usr/local/apache2/htdocs/library/Zend/Db/Adapter/Abstract.php(478): Zend_Db_Adapter_Pdo_Abstract->prepare('select proid, i...') #4 /usr/local/apache2/htdocs/library/Zend/Db/Adapter/Pdo/Abstract.php(238): Zend_Db_Adapter_Abs in /usr/local/apache2/htdocs/library/Zend/Db/Statement/Pdo.php on line 61

修复方案:

对proid 参数进行验证过滤。

版权声明:转载请注明来源 piaoye@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝

漏洞Rank:5 (WooYun评价)


漏洞评价:

评论

  1. 2012-02-16 15:52 | piaoye ( 普通白帽子 | Rank:343 漏洞数:53 | ww)

    我干。。修复了也不来认领