当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-087174

漏洞标题:某查询系统存在通用SQL注入漏洞

相关厂商:上海财大科技发展公司

漏洞作者: 贫道来自河北

提交时间:2014-12-16 17:03

修复时间:2015-03-16 17:04

公开时间:2015-03-16 17:04

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-12-16: 细节已通知厂商并且等待厂商处理中
2014-12-20: 厂商已经确认,细节仅向厂商公开
2014-12-23: 细节向第三方安全合作伙伴开放
2015-02-13: 细节向核心白帽子及相关领域专家公开
2015-02-23: 细节向普通白帽子公开
2015-03-05: 细节向实习白帽子公开
2015-03-16: 细节向公众公开

简要描述:

BOOM!!

详细说明:

厂商:上海财大科技发展公司(参考百度文库资料)
百度搜索关键字:科发网上查询系统
http://www.baidu.com/s?wd=科发网上查询系统&ie=utf-8
http://cn.bing.com/search?q=科发网上查询系统&ie=utf-8

28153605bb266f553cc9f84af4c96edd8f32568b.png


案例:
http://gzcx.tynu.edu.cn/kfweb/xyhzc.aspx __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUKMTc4MDE2NzI2NWRkrhmb26EYcFDPYGvaSO%2FAfi7Jp8s%3D&TextBox_xm=88952634&TextBox_sfz=88952634&TextBox_yhm=88952634&TextBox_pwd=88952634&Button_create=%C8%B7%EF%BF%BD%EF%BF%BD&__EVENTVALIDATION=%2FwEWCAKg3OrpBAKA1JSPCwLh04iPCwLw7pu8DgKvzdH%2BCALDmuG%2FDQLTnqaxBALkyryBDE9QUum1eG86i6%2FG1FnsGKRUpD%2Bw&TextBox_gh=88952634
http://221.5.51.228/cjb/xyhzc.aspx __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUKMTc4MDE2NzI2NWRk13qOcISde4deuzVS1PP9e6CsLo0%3D&TextBox_xm=88952634&TextBox_sfz=88952634&TextBox_yhm=88952634&TextBox_pwd=88952634&Button_create=%C8%B7%EF%BF%BD%EF%BF%BD&__EVENTVALIDATION=%2FwEWCALZ2PSBBwKA1JSPCwLh04iPCwLw7pu8DgKvzdH%2BCALDmuG%2FDQLTnqaxBALkyryBDIKO96kKVYakWPqVVO03s5yvV%2Fob&TextBox_gh=88952634
http://210.45.92.21/xyhzc.aspx __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwULLTE2MDExNDc2NTZkZJiemdmm%2BSHru2mvJIPwXzsQS5dJ&__EVENTVALIDATION=%2FwEWCQK6xaudCAKA1JSPCwLh04iPCwLw7pu8DgKvzdH%2BCALDmuG%2FDQK43YeBDQLTnqaxBALkyryBDNhioyJ9IduFn3FeqEczDMqKBd0m&TextBox_xm=88952634&TextBox_sfz=88952634&TextBox_yhm=88952634&TextBox_pwd=88952634&TextBox_pwdQr=88952634&Button_create=%C8%B7%EF%BF%BD%EF%BF%BD&TextBox_gh=88952634
http://www.shcdkf.com/kfweb/xyhzc.aspx __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUKMTc4MDE2NzI2NWRkwYuwZ66FLW%2BnSGue8Iy1TAjuXGQ%3D&__EVENTVALIDATION=%2FwEWCALgzfC%2FAQKA1JSPCwLh04iPCwLw7pu8DgKvzdH%2BCALDmuG%2FDQLTnqaxBALkyryBDIsADZhzEKCOp78Nk0cSROdAgzYy&TextBox_xm=88952634&TextBox_sfz=88952634&TextBox_yhm=88952634&TextBox_pwd=88952634&Button_create=%C8%B7%EF%BF%BD%EF%BF%BD&TextBox_gh=88952634
http://cwc.sxufe.edu.cn/KfWeb/xyhzc.aspx __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwULLTE2MDExNDc2NTZkZPWkQQZMBMtex131LJbKB1pJJJvZ&TextBox_gh=88952634&TextBox_xm=88952634&TextBox_yhm=88952634&TextBox_pwd=88952634&TextBox_pwdQr=88952634&Button_create=%C8%B7%EF%BF%BD%EF%BF%BD&__EVENTVALIDATION=%2FwEWCQKMhZWyDAKA1JSPCwLh04iPCwLw7pu8DgKvzdH%2BCALDmuG%2FDQK43YeBDQLTnqaxBALkyryBDOCMrvS9sRxeOUpk%2F74pg%2BDeGAeK&TextBox_sfz=88952634
http://www.cqvie.com/xfcxsq/xyhzc.aspx __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwULLTE2MDExNDc2NTZkZL%2FxT3ZxsQDJtBPDj8EAzazPFEt%2F&__VIEWSTATEGENERATOR=634D23E7&__EVENTVALIDATION=%2FwEWCQLV8PTzAQKA1JSPCwLh04iPCwLw7pu8DgKvzdH%2BCALDmuG%2FDQK43YeBDQLTnqaxBALkyryBDBJqh%2BLrxsYoyIKeSqpaoFW3T2sH&TextBox_xm=88952634&TextBox_sfz=88952634&TextBox_yhm=88952634&TextBox_pwd=88952634&TextBox_pwdQr=88952634&Button_create=%C8%B7%EF%BF%BD%EF%BF%BD&TextBox_gh=88952634

http://59.72.128.44/KfWeb/xyhzc.aspx __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwULLTE2MDExNDc2NTZkZNpGSj46EluRmFFXCCdZCDCkiWTT&TextBox_xm=88952634&TextBox_sfz=88952634&TextBox_yhm=88952634&TextBox_pwd=88952634&TextBox_pwdQr=88952634&Button_create=%C8%B7%EF%BF%BD%EF%BF%BD&__EVENTVALIDATION=%2FwEWCQK8y8uaCQKA1JSPCwLh04iPCwLw7pu8DgKvzdH%2BCALDmuG%2FDQK43YeBDQLTnqaxBALkyryBDITAYGliZi2JQeG7x3V03h%2FQqGB0&TextBox_gh=88952634

漏洞证明:

只演示1个站了
http://gzcx.tynu.edu.cn/kfweb/xyhzc.aspx

QQ图片20141214231833.jpg


QQ图片20141214231849.jpg

修复方案:

版权声明:转载请注明来源 贫道来自河北@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:13

确认时间:2014-12-20 16:52

厂商回复:

CNVD确认并复现所述情况,已经由CNVD通过网站公开联系方式(或以往建立的处置渠道)向网站管理单位(软件生产厂商)通报。

最新状态:

暂无