漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2013-09-26: 积极联系厂商并且等待厂商认领中,细节不对外公开
2013-11-10: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
耀莱成龙影城sql注入及弱口令;不知道能不能看电影
详细说明:
注入点
pacleNo和date注入
<code>Database: QUICK_DATA
Table: T0300_ORDERFORM
[42 columns]
+-----------------+----------+
| Column | Type |
+-----------------+----------+
| APPCODE | VARCHAR2 |
| BALANCEPRIC | NUMBER |
| CARDNUM | VARCHAR2 |
| CARDPLACENO | VARCHAR2 |
| CARDPWD | VARCHAR2 |
| FEATUREAPPNO | NUMBER |
| FEATUREDATE | VARCHAR2 |
| FEATURENO | VARCHAR2 |
| FEATURETIME | VARCHAR2 |
| FID | NUMBER |
| FOODMSG | VARCHAR2 |
| MEMO | VARCHAR2 |
| OPERUSERID | VARCHAR2 |
| OPERUSERNAME | VARCHAR2 |
| OPERUSERSID | VARCHAR2 |
| OPERUSERTYPE | VARCHAR2 |
| ORDERCHARGETYPE | NUMBER |
| ORDERDATE | VARCHAR2 |
| ORDERNO | NUMBER |
| ORDERTIME | VARCHAR2 |
| PAYORDER | VARCHAR2 |
| PAYPRICE | NUMBER |
| PAYREFUND | VARCHAR2 |
| PAYSERIAL | VARCHAR2 |
| PLACENO | VARCHAR2 |
| PRODATETIME | DATE |
| PROFLAG | VARCHAR2 |
| RECVMOBILENO | VARCHAR2 |
| REPFID | NUMBER |
| SEATINFO | VARCHAR2 |
| SEATPIECENAME | VARCHAR2 |
| SENDRESULT | VARCHAR2 |
| SENDTYPE | VARCHAR2 |
| STANDPRIC | NUMBER |
| SUCCSIGN | VARCHAR2 |
| TICKETSNUM | NUMBER |
| TICKETSPRICE | NUMBER |
| TICPRICE | NUMBER |
| TICTYPE | VARCHAR2 |
| USEFULLIFE | VARCHAR2 |
| USER_ID | NUMBER |
| VALIDCODE | VARCHAR2 |
+-----------------+----------+
网站支持在线选票及支付……
未继续
漏洞证明:
修复方案:
null
版权声明:转载请注明来源 yhoojj@乌云
>
漏洞回应
厂商回应:
未能联系到厂商或者厂商积极拒绝