当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0121825

漏洞标题:某远程视频会议系统5枚SQL注射

相关厂商:北京高百特科技有限公司

漏洞作者: 路人甲

提交时间:2015-06-23 12:00

修复时间:2015-09-24 16:16

公开时间:2015-09-24 16:16

漏洞类型:SQL注射漏洞

危害等级:高

自评Rank:12

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-23: 细节已通知厂商并且等待厂商处理中
2015-06-26: 厂商已经确认,细节仅向厂商公开
2015-06-29: 细节向第三方安全合作伙伴开放
2015-08-20: 细节向核心白帽子及相关领域专家公开
2015-08-30: 细节向普通白帽子公开
2015-09-09: 细节向实习白帽子公开
2015-09-24: 细节向公众公开

简要描述:

另5枚打包提交来

详细说明:

北京高百特科技有限公司开发的高百特网络视频会议系统支持几千人同时参加会议,支持工作会议、远程培训、产品销售、在线研讨会、咨询服务等各种应用场景,并与行业结合提供各类行业的解决方案,全高清视频和高保真音质效果突破地域的限制,丰富的多媒体互动和数据共享功能让沟通更方便。
SQL1:

/web/users/depttree.php?deptid=&level=0&deptname=   deptid 存在注入


Case:

http://115.28.233.30:7921/web/users/depttree.php?deptid=&level=0&deptname=
http://1.93.4.40:89/web/users/depttree.php?deptid=&level=0&deptname=
http://www.bj-tofi.com:89/web/users/depttree.php?deptid=&level=0&deptname=
http://218.89.3.21:89/web/users/depttree.php?deptid=&level=0&deptname=
http://121.199.29.166:89/users/depttree.php?deptid=&level=0&deptname=
http://122.200.76.233/web/users/depttree.php?deptid=&level=0&deptname=


SQL2:

/web/conferences/journal.php?confid=732453&page=2&topic=SMB%E6%B8%A0%E9%81%93%E6%9C%8D%E5%8A%A1%E6%94%BF%E7%AD%96%E8%AE%A8%E8%AE%BA-2&funid=8   confid存在注入


Case:

http://115.28.233.30:7921/web/conferences/journal.php?confid=732453&page=2&topic=SMB
%E6%B8%A0%E9%81%93%E6%9C%8D%E5%8A%A1%E6%94%BF%E7%AD%96%E8%AE%A8%E8%AE%BA-2&funid=8
http://218.89.3.21:89/web/conferences/journal.php?confid=732453&page=2&topic=SMB
%E6%B8%A0%E9%81%93%E6%9C%8D%E5%8A%A1%E6%94%BF%E7%AD%96%E8%AE%A8%E8%AE%BA-2&funid=8
http://www.bj-tofi.com:89/web/conferences/journal.php?confid=732453&page=2&topic=SMB
%E6%B8%A0%E9%81%93%E6%9C%8D%E5%8A%A1%E6%94%BF%E7%AD%96%E8%AE%A8%E8%AE%BA-2&funid=8
http://122.200.76.233/web/conferences/journal.php?confid=732453&page=2&topic=SMB
%E6%B8%A0%E9%81%93%E6%9C%8D%E5%8A%A1%E6%94%BF%E7%AD%96%E8%AE%A8%E8%AE%BA-2&funid=8
http://1.93.4.40:89/web/conferences/journal.php?confid=732453&page=2&topic=SMB
%E6%B8%A0%E9%81%93%E6%9C%8D%E5%8A%A1%E6%94%BF%E7%AD%96%E8%AE%A8%E8%AE%BA-2&funid=8


SQL3:

/web/monitor/depttree.php?parentid=&level=0&deptname=&ran=1434786772  parentid存在注入


Case:

http://121.199.29.166:89/web/monitor/depttree.php?parentid=&level=0&deptname=&ran=1434786772
http://122.200.76.233/web/monitor/depttree.php?parentid=&level=0&deptname=&ran=1434786772
http://www.bj-tofi.com:89/web/monitor/depttree.php?parentid=&level=0&deptname=&ran=1434786772
http://218.89.3.21:89/web/monitor/depttree.php?parentid=&level=0&deptname=&ran=1434786772
http://115.28.233.30:7921/web/monitor/depttree.php?parentid=&level=0&deptname=&ran=1434786772
http://1.93.4.40:89/web/monitor/depttree.php?parentid=&level=0&deptname=&ran=1434786772


SQL4:

/web/department/depttree.php?parentid=1  parentid存在注入


Case:

http://121.199.29.166:89/web/department/depttree.php?parentid=1
http://122.200.76.233/web/department/depttree.php?parentid=1
http://www.bj-tofi.com:89/web/department/depttree.php?parentid=1
http://218.89.3.21:89/web/department/depttree.php?parentid=1
http://115.28.233.30:7921/web/department/depttree.php?parentid=1
http://1.93.4.40:89/web/department/depttree.php?parentid=1


SQL5:

/web/dept.php?lan=zh_cn&deptcode=root  deptcode存在注入


Case:

http://121.199.29.166:89/web/dept.php?lan=zh_cn&deptcode=root
http://122.200.76.233/web/dept.php?lan=zh_cn&deptcode=root
http://www.bj-tofi.com:89/web/dept.php?lan=zh_cn&deptcode=root
http://218.89.3.21:89/web/dept.php?lan=zh_cn&deptcode=root
http://115.28.233.30:7921/web/dept.php?lan=zh_cn&deptcode=root
http://1.93.4.40:89/web/dept.php?lan=zh_cn&deptcode=root

漏洞证明:

证明:

第一处证明:/web/users/depttree.php?deptid=&level=0&deptname=

sql1.1.png


sql1.2.png


第二处证明:/web/conferences/journal.php?confid=732453&page=2&topic=SMB%E6%B8%A0%E9%81%93%E6%9C%8D%E5%8A%A1%E6%94%BF%E7%AD%96%E8%AE%A8%E8%AE%BA-2&funid=8

sql2.1.png


sql2.2.png


第三处证明:/web/monitor/depttree.php?parentid=&level=0&deptname=&ran=1434786772

3.1.png


3.2.png


第四处证明:/web/department/depttree.php?parentid=1

4.1.png


4.2.png


第五处证明:/web/dept.php?lan=zh_cn&deptcode=root

4.png


5.2.png

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:13

确认时间:2015-06-26 16:14

厂商回复:

CNVD确认所述情况,已由CNVD通过软件生产厂商公开联系渠道向其邮件通报,由其后续提供解决方案并协调相关用户单位处置。

最新状态:

暂无