当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:
漏洞标题:
anwsion漏洞小礼包
相关厂商:
漏洞作者:
提交时间:
2012-10-11 12:10
修复时间:
2012-10-16 12:11
公开时间:
2012-10-16 12:11
漏洞类型:
SQL注射漏洞
危害等级:
自评Rank:
20
漏洞状态:
漏洞已经通知厂商但是厂商忽略漏洞
漏洞来源:
http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签:
分享漏洞:
4人收藏 收藏
分享漏洞:

>

漏洞详情

披露状态:

2012-10-11: 细节已通知厂商并且等待厂商处理中
2012-10-16: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

小礼包=小礼物?

详细说明:

1.数据库配置信息泄漏
http://wenda.anwsion.com/system/config/database.php_bak
2.SQLI
一个http://wenda.anwsion.com/category/1'"
两个http://wenda.anwsion.com/account/ajax/login_process/
POST:net_auto_login=1&password=123456&post_hash=9ed50d5bb8509404&return_url=http%3A%2F%2Fwenda.anwsion.com%2F&user_name=%5c
3.SVN
http://wenda.anwsion.com/.svn/entries
http://wenda.anwsion.com/app/.svn/entries
http://wenda.anwsion.com/static/.svn/entries
http://wenda.anwsion.com/models/.svn/entries
http://wenda.anwsion.com/install/.svn/entries
http://wenda.anwsion.com/system/.svn/entries
http://wenda.anwsion.com/views/.svn/entries
4.error message 泄漏绝对路径
http://wenda.anwsion.com/app/account/ajax.php
http://wenda.anwsion.com/app/account/find_password.php
http://wenda.anwsion.com/app/account/main.php
http://wenda.anwsion.com/app/account/openid.php
http://wenda.anwsion.com/app/account/qq.php
http://wenda.anwsion.com/app/account/setting.php

漏洞证明:

修复方案:

1.访问控制
2.输入过滤
3.<Directory ~ "\.svn">
Order allow,deny
Deny from all
</Directory>
4.关闭回显

版权声明:转载请注明来源 瘦蛟舞@乌云


>

漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2012-10-16 12:11

厂商回复:

最新状态:

2012-10-16:新版本已经修复